f15hb0wn commited on
Commit
d94b1bb
·
verified ·
1 Parent(s): 431787c

Upload per-incident GraphML sharded batch 5/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/2/28341f50-45d1-11ee-95ea-81d84bb304b3.graphml +221 -0
  2. graph/incidents_graphml/2/2839cdf0-5793-11ee-97ff-3b19ab007f30.graphml +77 -0
  3. graph/incidents_graphml/2/283b6690-2a82-11ed-8698-87f85c8d72c2.graphml +63 -0
  4. graph/incidents_graphml/2/283d9f00-899a-11ee-bba1-ef6459fc1a52.graphml +63 -0
  5. graph/incidents_graphml/2/283f2df0-ff80-11ee-b9e5-11c35e54feda.graphml +77 -0
  6. graph/incidents_graphml/2/284c6c10-899a-11ee-bba1-ef6459fc1a52.graphml +63 -0
  7. graph/incidents_graphml/2/2852ce80-397f-11ef-bdca-fd3640be1aae.graphml +113 -0
  8. graph/incidents_graphml/2/285ac8e0-eb1d-11ec-80a1-dd24f7271411.graphml +365 -0
  9. graph/incidents_graphml/2/285bfc70-899a-11ee-bba1-ef6459fc1a52.graphml +63 -0
  10. graph/incidents_graphml/2/285d8f90-12a8-11ee-9cb5-514a509424ae.graphml +63 -0
  11. graph/incidents_graphml/2/2875f200-eb1d-11ec-80a1-dd24f7271411.graphml +207 -0
  12. graph/incidents_graphml/2/28861ea0-eb1d-11ec-80a1-dd24f7271411.graphml +517 -0
  13. graph/incidents_graphml/2/2889a3d0-5760-11ee-b4dd-e56c30c12cd4.graphml +85 -0
  14. graph/incidents_graphml/2/289a8b50-4e6e-11ee-81d4-670b4c6897d4.graphml +63 -0
  15. graph/incidents_graphml/2/289edf80-ee7c-11ee-8c82-b10f259979aa.graphml +85 -0
  16. graph/incidents_graphml/2/28abc960-4e6e-11ee-81d4-670b4c6897d4.graphml +63 -0
  17. graph/incidents_graphml/2/28adefd0-22ca-11ee-a717-3b672dfcef5e.graphml +221 -0
  18. graph/incidents_graphml/2/28b21960-ee7c-11ee-8c82-b10f259979aa.graphml +63 -0
  19. graph/incidents_graphml/2/28bba7e0-4e6e-11ee-81d4-670b4c6897d4.graphml +63 -0
  20. graph/incidents_graphml/2/28c28850-889b-11ee-9ada-6590fb922310.graphml +63 -0
  21. graph/incidents_graphml/2/28ce9fa0-1aa5-11ee-ae54-3b636b49055b.graphml +77 -0
  22. graph/incidents_graphml/2/28d23fc0-889b-11ee-9ada-6590fb922310.graphml +63 -0
  23. graph/incidents_graphml/2/28df0400-696d-11ee-99bd-0777ff256373.graphml +63 -0
  24. graph/incidents_graphml/2/28ec4a70-696d-11ee-99bd-0777ff256373.graphml +85 -0
  25. graph/incidents_graphml/2/28f1daf0-791f-11ee-91ac-9dbe9218e297.graphml +77 -0
  26. graph/incidents_graphml/2/28f7d680-a813-11ee-99fc-3f84722b2bdf.graphml +63 -0
  27. graph/incidents_graphml/2/28f83c90-1ca6-11ee-8a30-871cf58c099a.graphml +63 -0
  28. graph/incidents_graphml/2/28fabcb0-a813-11ee-99fc-3f84722b2bdf.graphml +63 -0
  29. graph/incidents_graphml/2/28fb1780-696d-11ee-99bd-0777ff256373.graphml +63 -0
  30. graph/incidents_graphml/2/2908d320-696d-11ee-99bd-0777ff256373.graphml +85 -0
  31. graph/incidents_graphml/2/290ab520-eb63-11ec-8162-f7a03e680dde.graphml +63 -0
  32. graph/incidents_graphml/2/290c2e30-9e15-11ee-a5ab-8550688be6fd.graphml +221 -0
  33. graph/incidents_graphml/2/29125360-4e6e-11ee-81d4-670b4c6897d4.graphml +63 -0
  34. graph/incidents_graphml/2/29181560-696d-11ee-99bd-0777ff256373.graphml +63 -0
  35. graph/incidents_graphml/2/292195a0-4e6e-11ee-81d4-670b4c6897d4.graphml +63 -0
  36. graph/incidents_graphml/2/2925d100-696d-11ee-99bd-0777ff256373.graphml +107 -0
  37. graph/incidents_graphml/2/292df1b0-4e6e-11ee-81d4-670b4c6897d4.graphml +63 -0
  38. graph/incidents_graphml/2/293b3820-4e6e-11ee-81d4-670b4c6897d4.graphml +63 -0
  39. graph/incidents_graphml/2/294259b0-696d-11ee-99bd-0777ff256373.graphml +63 -0
  40. graph/incidents_graphml/2/29427560-7d24-11ee-b619-8bfdf25c0d9a.graphml +63 -0
  41. graph/incidents_graphml/2/2948b480-654a-11ee-a13a-239f8a76841b.graphml +63 -0
  42. graph/incidents_graphml/2/29519090-7d24-11ee-b619-8bfdf25c0d9a.graphml +63 -0
  43. graph/incidents_graphml/2/2956b240-eb63-11ec-8162-f7a03e680dde.graphml +63 -0
  44. graph/incidents_graphml/2/295993f0-085a-11ef-81c9-bbab78bb4e36.graphml +77 -0
  45. graph/incidents_graphml/2/29599f50-0a43-11ee-bdb0-15a1612d17d2.graphml +337 -0
  46. graph/incidents_graphml/2/295b0400-654a-11ee-a13a-239f8a76841b.graphml +63 -0
  47. graph/incidents_graphml/2/29682e30-533c-11ed-82ec-e7a72760a0c9.graphml +357 -0
  48. graph/incidents_graphml/2/296b3e70-696d-11ee-99bd-0777ff256373.graphml +63 -0
  49. graph/incidents_graphml/2/296fc7d0-1f6a-11ee-86d7-9d80e15c5f0c.graphml +63 -0
  50. graph/incidents_graphml/2/29709490-718f-11ee-9fe3-bf96143a208f.graphml +185 -0
graph/incidents_graphml/2/28341f50-45d1-11ee-95ea-81d84bb304b3.graphml ADDED
@@ -0,0 +1,221 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="27bf6482-45d1-11ee-a121-05e2f84eaf7f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.69.168</data>
35
+ <data key="n_hostname">100.64.69.168</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.49375</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="af00dcda-0625-11ee-872d-37355cbb58d3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.26</data>
43
+ <data key="n_hostname">100.64.68.26</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.746875</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <node id="580eda24-39bb-11ee-b099-49302dfbacaf">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.37.22</data>
51
+ <data key="n_hostname">100.64.37.22</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.746875</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <node id="0898de60-07e7-11ee-adc2-7513f160fa3e">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.33.70</data>
59
+ <data key="n_hostname">100.64.33.70</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.49375</data>
62
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
63
+ </node>
64
+ <node id="c9c2af89-0625-11ee-9f36-61ae8743c399">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.68.10</data>
67
+ <data key="n_hostname">100.64.68.10</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.6625</data>
70
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
71
+ </node>
72
+ <node id="491f8102-107a-11ee-a3a7-917e86410ae0">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.54.94</data>
75
+ <data key="n_hostname">100.64.54.94</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.49375</data>
78
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
79
+ </node>
80
+ <edge id="e1" source="27bf6482-45d1-11ee-a121-05e2f84eaf7f" target="HOST-11397">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1693247512</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.746875</data>
85
+ <data key="e_suspicion_score">0.746875</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Disrupted</data>
92
+ <data key="e_incident_id">28341f50-45d1-11ee-95ea-81d84bb304b3</data>
93
+ </edge>
94
+ <edge id="e2" source="HOST-11397" target="27bf6482-45d1-11ee-a121-05e2f84eaf7f">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1693247512</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.746875</data>
99
+ <data key="e_suspicion_score">0.746875</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Disrupted</data>
106
+ <data key="e_incident_id">28341f50-45d1-11ee-95ea-81d84bb304b3</data>
107
+ </edge>
108
+ <edge id="e3" source="580eda24-39bb-11ee-b099-49302dfbacaf" target="HOST-11397">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1693247512</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.746875</data>
113
+ <data key="e_suspicion_score">0.746875</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Disrupted</data>
120
+ <data key="e_incident_id">28341f50-45d1-11ee-95ea-81d84bb304b3</data>
121
+ </edge>
122
+ <edge id="e4" source="HOST-11397" target="580eda24-39bb-11ee-b099-49302dfbacaf">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1693247512</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.746875</data>
127
+ <data key="e_suspicion_score">0.746875</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Disrupted</data>
134
+ <data key="e_incident_id">28341f50-45d1-11ee-95ea-81d84bb304b3</data>
135
+ </edge>
136
+ <edge id="e5" source="HOST-11763" target="HOST-11397">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1693247512</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.746875</data>
141
+ <data key="e_suspicion_score">0.746875</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Disrupted</data>
148
+ <data key="e_incident_id">28341f50-45d1-11ee-95ea-81d84bb304b3</data>
149
+ </edge>
150
+ <edge id="e6" source="HOST-11397" target="HOST-11763">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1693247512</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.746875</data>
155
+ <data key="e_suspicion_score">0.746875</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Disrupted</data>
162
+ <data key="e_incident_id">28341f50-45d1-11ee-95ea-81d84bb304b3</data>
163
+ </edge>
164
+ <edge id="e7" source="580eda24-39bb-11ee-b099-49302dfbacaf" target="HOST-11380">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1693247512</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.746875</data>
169
+ <data key="e_suspicion_score">0.746875</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Disrupted</data>
176
+ <data key="e_incident_id">28341f50-45d1-11ee-95ea-81d84bb304b3</data>
177
+ </edge>
178
+ <edge id="e8" source="HOST-11380" target="580eda24-39bb-11ee-b099-49302dfbacaf">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1693247512</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.746875</data>
183
+ <data key="e_suspicion_score">0.746875</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Disrupted</data>
190
+ <data key="e_incident_id">28341f50-45d1-11ee-95ea-81d84bb304b3</data>
191
+ </edge>
192
+ <edge id="e9" source="491f8102-107a-11ee-a3a7-917e86410ae0" target="HOST-11397">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1693247512</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.746875</data>
197
+ <data key="e_suspicion_score">0.746875</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Disrupted</data>
204
+ <data key="e_incident_id">28341f50-45d1-11ee-95ea-81d84bb304b3</data>
205
+ </edge>
206
+ <edge id="e10" source="HOST-11397" target="491f8102-107a-11ee-a3a7-917e86410ae0">
207
+ <data key="e_type">INCIDENT_LINK</data>
208
+ <data key="e_timestamp">1693247512</data>
209
+ <data key="e_label_binary">malicious</data>
210
+ <data key="e_label_confidence">0.746875</data>
211
+ <data key="e_suspicion_score">0.746875</data>
212
+ <data key="e_mo_name">Data Theft</data>
213
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
214
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
215
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
216
+ <data key="e_lifecycle_stage">complete-mission</data>
217
+ <data key="e_disposition">Disrupted</data>
218
+ <data key="e_incident_id">28341f50-45d1-11ee-95ea-81d84bb304b3</data>
219
+ </edge>
220
+ </graph>
221
+ </graphml>
graph/incidents_graphml/2/2839cdf0-5793-11ee-97ff-3b19ab007f30.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2c797043-32f0-11ee-a201-e949976f71e6">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.7.155</data>
35
+ <data key="n_hostname">100.64.7.155</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="0027f7c6-0625-11ee-9290-9f7f8caf087f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.31</data>
43
+ <data key="n_hostname">100.64.68.31</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11683" target="HOST-11404">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695200004</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">2839cdf0-5793-11ee-97ff-3b19ab007f30</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-11404" target="HOST-11683">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1695200004</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">2839cdf0-5793-11ee-97ff-3b19ab007f30</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/2/283b6690-2a82-11ed-8698-87f85c8d72c2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bed05842-0485-11ed-927b-93d2d1ced935">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.86.238</data>
35
+ <data key="n_hostname">100.64.86.238</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="05d136d1-2a54-11ed-aa89-05f87b4fb578">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.207.79.45</data>
43
+ <data key="n_hostname">10.207.79.45</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="bed05842-0485-11ed-927b-93d2d1ced935" target="HOST-16887">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1662097402</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">283b6690-2a82-11ed-8698-87f85c8d72c2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/283d9f00-899a-11ee-bba1-ef6459fc1a52.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="219b5169-899a-11ee-8095-9b21ed50cd94">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.8.1</data>
35
+ <data key="n_hostname">100.64.8.1</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.201.119</data>
43
+ <data key="n_hostname">172.30.201.119</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="219b5169-899a-11ee-8095-9b21ed50cd94" target="HOST-2760">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700700568</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">283d9f00-899a-11ee-bba1-ef6459fc1a52</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/283f2df0-ff80-11ee-b9e5-11c35e54feda.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0be80874-3802-11ee-90a7-414745ddcc24">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.13.70</data>
35
+ <data key="n_hostname">100.64.13.70</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.746875</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="13f0b4d9-0626-11ee-86d0-ab9d4a7dffa4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.12</data>
43
+ <data key="n_hostname">100.64.68.12</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Protect","CASB"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11488" target="HOST-11382">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713663639</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.746875</data>
53
+ <data key="e_suspicion_score">0.746875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">283f2df0-ff80-11ee-b9e5-11c35e54feda</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-11382" target="HOST-11488">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1713663639</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.746875</data>
67
+ <data key="e_suspicion_score">0.746875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">283f2df0-ff80-11ee-b9e5-11c35e54feda</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/2/284c6c10-899a-11ee-bba1-ef6459fc1a52.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.201.119</data>
35
+ <data key="n_hostname">172.30.201.119</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="219b5169-899a-11ee-8095-9b21ed50cd94">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.1</data>
43
+ <data key="n_hostname">100.64.8.1</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2760" target="HOST-2829">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700700568</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">284c6c10-899a-11ee-bba1-ef6459fc1a52</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/2852ce80-397f-11ef-bdca-fd3640be1aae.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d3b524d3-28f4-11ef-aead-b741176e73de">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.18.96.192</data>
35
+ <data key="n_hostname">172.18.96.192</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="754e9892-2912-11ef-b1ab-152dcc28d0a8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.25.94</data>
43
+ <data key="n_hostname">100.64.25.94</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="2b709551-30e4-11ef-9231-b71b92722fd8">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.59.127</data>
51
+ <data key="n_hostname">100.64.59.127</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-5336" target="754e9892-2912-11ef-b1ab-152dcc28d0a8">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1720040377</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">2852ce80-397f-11ef-bdca-fd3640be1aae</data>
69
+ </edge>
70
+ <edge id="e2" source="754e9892-2912-11ef-b1ab-152dcc28d0a8" target="HOST-5336">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1720040377</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">2852ce80-397f-11ef-bdca-fd3640be1aae</data>
83
+ </edge>
84
+ <edge id="e3" source="2b709551-30e4-11ef-9231-b71b92722fd8" target="HOST-5336">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1720040377</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">2852ce80-397f-11ef-bdca-fd3640be1aae</data>
97
+ </edge>
98
+ <edge id="e4" source="HOST-5336" target="2b709551-30e4-11ef-9231-b71b92722fd8">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1720040377</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">2852ce80-397f-11ef-bdca-fd3640be1aae</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/2/285ac8e0-eb1d-11ec-80a1-dd24f7271411.graphml ADDED
@@ -0,0 +1,365 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d856d6d1-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.72.170</data>
35
+ <data key="n_hostname">USER-0015-1679.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.9208984375</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="79068b30-eacd-11ec-8bb4-219107dedea3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.74.118</data>
43
+ <data key="n_hostname">USER-0015-1680.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <node id="e671add0-ea91-11ec-abf7-619673fe2558">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.74.119</data>
51
+ <data key="n_hostname">USER-0015-1681.example.internal</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="d6ac0b30-eacc-11ec-a589-1551834e6e09">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.74.120</data>
59
+ <data key="n_hostname">USER-0015-1682.example.internal</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="63cd6de0-eacf-11ec-8251-3b137820c129">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.74.121</data>
67
+ <data key="n_hostname">USER-0015-1683.example.internal</data>
68
+ <data key="n_set_roles">["Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.4375</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <node id="d91d8060-eacc-11ec-b547-c3ac82390749">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.74.122</data>
75
+ <data key="n_hostname">USER-0015-1684.example.internal</data>
76
+ <data key="n_set_roles">["Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.4375</data>
78
+ <data key="n_products">["Precinct","Meraki"]</data>
79
+ </node>
80
+ <node id="f80d9370-eacc-11ec-a589-1551834e6e09">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.74.123</data>
83
+ <data key="n_hostname">USER-0015-1685.example.internal</data>
84
+ <data key="n_set_roles">["Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.4375</data>
86
+ <data key="n_products">["Precinct","Meraki"]</data>
87
+ </node>
88
+ <node id="b07d9c20-eacd-11ec-b5f9-f94203472ff7">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.74.124</data>
91
+ <data key="n_hostname">USER-0015-1686.example.internal</data>
92
+ <data key="n_set_roles">["Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.4375</data>
94
+ <data key="n_products">["Precinct","Meraki"]</data>
95
+ </node>
96
+ <node id="e5c112f0-eac7-11ec-987b-53c6c1fd0ba8">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.74.125</data>
99
+ <data key="n_hostname">USER-0015-1687.example.internal</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.4375</data>
102
+ <data key="n_products">["Precinct","Meraki"]</data>
103
+ </node>
104
+ <node id="785cddb0-eacd-11ec-8072-efa4c5a6e66d">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.74.126</data>
107
+ <data key="n_hostname">USER-0015-1688.example.internal</data>
108
+ <data key="n_set_roles">["Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.4375</data>
110
+ <data key="n_products">["Precinct","Meraki"]</data>
111
+ </node>
112
+ <edge id="e1" source="d856d6d1-ea91-11ec-90c7-eff83c975df3" target="79068b30-eacd-11ec-8bb4-219107dedea3">
113
+ <data key="e_type">INCIDENT_LINK</data>
114
+ <data key="e_timestamp">1655127100</data>
115
+ <data key="e_label_binary">malicious</data>
116
+ <data key="e_label_confidence">0.9208984375</data>
117
+ <data key="e_suspicion_score">0.9208984375</data>
118
+ <data key="e_mo_name">Data Theft</data>
119
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
120
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
121
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
122
+ <data key="e_lifecycle_stage">complete-mission</data>
123
+ <data key="e_disposition">Disrupted</data>
124
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
125
+ </edge>
126
+ <edge id="e2" source="79068b30-eacd-11ec-8bb4-219107dedea3" target="d856d6d1-ea91-11ec-90c7-eff83c975df3">
127
+ <data key="e_type">INCIDENT_LINK</data>
128
+ <data key="e_timestamp">1655127100</data>
129
+ <data key="e_label_binary">malicious</data>
130
+ <data key="e_label_confidence">0.9208984375</data>
131
+ <data key="e_suspicion_score">0.9208984375</data>
132
+ <data key="e_mo_name">Data Theft</data>
133
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
134
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
135
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
136
+ <data key="e_lifecycle_stage">complete-mission</data>
137
+ <data key="e_disposition">Disrupted</data>
138
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
139
+ </edge>
140
+ <edge id="e3" source="e671add0-ea91-11ec-abf7-619673fe2558" target="d856d6d1-ea91-11ec-90c7-eff83c975df3">
141
+ <data key="e_type">INCIDENT_LINK</data>
142
+ <data key="e_timestamp">1655127100</data>
143
+ <data key="e_label_binary">malicious</data>
144
+ <data key="e_label_confidence">0.9208984375</data>
145
+ <data key="e_suspicion_score">0.9208984375</data>
146
+ <data key="e_mo_name">Data Theft</data>
147
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
148
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
149
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
150
+ <data key="e_lifecycle_stage">complete-mission</data>
151
+ <data key="e_disposition">Disrupted</data>
152
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
153
+ </edge>
154
+ <edge id="e4" source="d856d6d1-ea91-11ec-90c7-eff83c975df3" target="e671add0-ea91-11ec-abf7-619673fe2558">
155
+ <data key="e_type">INCIDENT_LINK</data>
156
+ <data key="e_timestamp">1655127100</data>
157
+ <data key="e_label_binary">malicious</data>
158
+ <data key="e_label_confidence">0.9208984375</data>
159
+ <data key="e_suspicion_score">0.9208984375</data>
160
+ <data key="e_mo_name">Data Theft</data>
161
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
162
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
163
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
164
+ <data key="e_lifecycle_stage">complete-mission</data>
165
+ <data key="e_disposition">Disrupted</data>
166
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
167
+ </edge>
168
+ <edge id="e5" source="d6ac0b30-eacc-11ec-a589-1551834e6e09" target="d856d6d1-ea91-11ec-90c7-eff83c975df3">
169
+ <data key="e_type">INCIDENT_LINK</data>
170
+ <data key="e_timestamp">1655127100</data>
171
+ <data key="e_label_binary">malicious</data>
172
+ <data key="e_label_confidence">0.9208984375</data>
173
+ <data key="e_suspicion_score">0.9208984375</data>
174
+ <data key="e_mo_name">Data Theft</data>
175
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
176
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
177
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
178
+ <data key="e_lifecycle_stage">complete-mission</data>
179
+ <data key="e_disposition">Disrupted</data>
180
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
181
+ </edge>
182
+ <edge id="e6" source="d856d6d1-ea91-11ec-90c7-eff83c975df3" target="d6ac0b30-eacc-11ec-a589-1551834e6e09">
183
+ <data key="e_type">INCIDENT_LINK</data>
184
+ <data key="e_timestamp">1655127100</data>
185
+ <data key="e_label_binary">malicious</data>
186
+ <data key="e_label_confidence">0.9208984375</data>
187
+ <data key="e_suspicion_score">0.9208984375</data>
188
+ <data key="e_mo_name">Data Theft</data>
189
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
190
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
191
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
192
+ <data key="e_lifecycle_stage">complete-mission</data>
193
+ <data key="e_disposition">Disrupted</data>
194
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
195
+ </edge>
196
+ <edge id="e7" source="d856d6d1-ea91-11ec-90c7-eff83c975df3" target="63cd6de0-eacf-11ec-8251-3b137820c129">
197
+ <data key="e_type">INCIDENT_LINK</data>
198
+ <data key="e_timestamp">1655127100</data>
199
+ <data key="e_label_binary">malicious</data>
200
+ <data key="e_label_confidence">0.9208984375</data>
201
+ <data key="e_suspicion_score">0.9208984375</data>
202
+ <data key="e_mo_name">Data Theft</data>
203
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
204
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
205
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
206
+ <data key="e_lifecycle_stage">complete-mission</data>
207
+ <data key="e_disposition">Disrupted</data>
208
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
209
+ </edge>
210
+ <edge id="e8" source="63cd6de0-eacf-11ec-8251-3b137820c129" target="d856d6d1-ea91-11ec-90c7-eff83c975df3">
211
+ <data key="e_type">INCIDENT_LINK</data>
212
+ <data key="e_timestamp">1655127100</data>
213
+ <data key="e_label_binary">malicious</data>
214
+ <data key="e_label_confidence">0.9208984375</data>
215
+ <data key="e_suspicion_score">0.9208984375</data>
216
+ <data key="e_mo_name">Data Theft</data>
217
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
218
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
219
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
220
+ <data key="e_lifecycle_stage">complete-mission</data>
221
+ <data key="e_disposition">Disrupted</data>
222
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
223
+ </edge>
224
+ <edge id="e9" source="d856d6d1-ea91-11ec-90c7-eff83c975df3" target="d91d8060-eacc-11ec-b547-c3ac82390749">
225
+ <data key="e_type">INCIDENT_LINK</data>
226
+ <data key="e_timestamp">1655127100</data>
227
+ <data key="e_label_binary">malicious</data>
228
+ <data key="e_label_confidence">0.9208984375</data>
229
+ <data key="e_suspicion_score">0.9208984375</data>
230
+ <data key="e_mo_name">Data Theft</data>
231
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
232
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
233
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
234
+ <data key="e_lifecycle_stage">complete-mission</data>
235
+ <data key="e_disposition">Disrupted</data>
236
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
237
+ </edge>
238
+ <edge id="e10" source="d91d8060-eacc-11ec-b547-c3ac82390749" target="d856d6d1-ea91-11ec-90c7-eff83c975df3">
239
+ <data key="e_type">INCIDENT_LINK</data>
240
+ <data key="e_timestamp">1655127100</data>
241
+ <data key="e_label_binary">malicious</data>
242
+ <data key="e_label_confidence">0.9208984375</data>
243
+ <data key="e_suspicion_score">0.9208984375</data>
244
+ <data key="e_mo_name">Data Theft</data>
245
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
246
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
247
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
248
+ <data key="e_lifecycle_stage">complete-mission</data>
249
+ <data key="e_disposition">Disrupted</data>
250
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
251
+ </edge>
252
+ <edge id="e11" source="d856d6d1-ea91-11ec-90c7-eff83c975df3" target="f80d9370-eacc-11ec-a589-1551834e6e09">
253
+ <data key="e_type">INCIDENT_LINK</data>
254
+ <data key="e_timestamp">1655127100</data>
255
+ <data key="e_label_binary">malicious</data>
256
+ <data key="e_label_confidence">0.9208984375</data>
257
+ <data key="e_suspicion_score">0.9208984375</data>
258
+ <data key="e_mo_name">Data Theft</data>
259
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
260
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
261
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
262
+ <data key="e_lifecycle_stage">complete-mission</data>
263
+ <data key="e_disposition">Disrupted</data>
264
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
265
+ </edge>
266
+ <edge id="e12" source="f80d9370-eacc-11ec-a589-1551834e6e09" target="d856d6d1-ea91-11ec-90c7-eff83c975df3">
267
+ <data key="e_type">INCIDENT_LINK</data>
268
+ <data key="e_timestamp">1655127100</data>
269
+ <data key="e_label_binary">malicious</data>
270
+ <data key="e_label_confidence">0.9208984375</data>
271
+ <data key="e_suspicion_score">0.9208984375</data>
272
+ <data key="e_mo_name">Data Theft</data>
273
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
274
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
275
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
276
+ <data key="e_lifecycle_stage">complete-mission</data>
277
+ <data key="e_disposition">Disrupted</data>
278
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
279
+ </edge>
280
+ <edge id="e13" source="d856d6d1-ea91-11ec-90c7-eff83c975df3" target="b07d9c20-eacd-11ec-b5f9-f94203472ff7">
281
+ <data key="e_type">INCIDENT_LINK</data>
282
+ <data key="e_timestamp">1655127100</data>
283
+ <data key="e_label_binary">malicious</data>
284
+ <data key="e_label_confidence">0.9208984375</data>
285
+ <data key="e_suspicion_score">0.9208984375</data>
286
+ <data key="e_mo_name">Data Theft</data>
287
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
288
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
289
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
290
+ <data key="e_lifecycle_stage">complete-mission</data>
291
+ <data key="e_disposition">Disrupted</data>
292
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
293
+ </edge>
294
+ <edge id="e14" source="b07d9c20-eacd-11ec-b5f9-f94203472ff7" target="d856d6d1-ea91-11ec-90c7-eff83c975df3">
295
+ <data key="e_type">INCIDENT_LINK</data>
296
+ <data key="e_timestamp">1655127100</data>
297
+ <data key="e_label_binary">malicious</data>
298
+ <data key="e_label_confidence">0.9208984375</data>
299
+ <data key="e_suspicion_score">0.9208984375</data>
300
+ <data key="e_mo_name">Data Theft</data>
301
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
302
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
303
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
304
+ <data key="e_lifecycle_stage">complete-mission</data>
305
+ <data key="e_disposition">Disrupted</data>
306
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
307
+ </edge>
308
+ <edge id="e15" source="e5c112f0-eac7-11ec-987b-53c6c1fd0ba8" target="d856d6d1-ea91-11ec-90c7-eff83c975df3">
309
+ <data key="e_type">INCIDENT_LINK</data>
310
+ <data key="e_timestamp">1655127100</data>
311
+ <data key="e_label_binary">malicious</data>
312
+ <data key="e_label_confidence">0.9208984375</data>
313
+ <data key="e_suspicion_score">0.9208984375</data>
314
+ <data key="e_mo_name">Data Theft</data>
315
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
316
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
317
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
318
+ <data key="e_lifecycle_stage">complete-mission</data>
319
+ <data key="e_disposition">Disrupted</data>
320
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
321
+ </edge>
322
+ <edge id="e16" source="d856d6d1-ea91-11ec-90c7-eff83c975df3" target="e5c112f0-eac7-11ec-987b-53c6c1fd0ba8">
323
+ <data key="e_type">INCIDENT_LINK</data>
324
+ <data key="e_timestamp">1655127100</data>
325
+ <data key="e_label_binary">malicious</data>
326
+ <data key="e_label_confidence">0.9208984375</data>
327
+ <data key="e_suspicion_score">0.9208984375</data>
328
+ <data key="e_mo_name">Data Theft</data>
329
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
330
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
331
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
332
+ <data key="e_lifecycle_stage">complete-mission</data>
333
+ <data key="e_disposition">Disrupted</data>
334
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
335
+ </edge>
336
+ <edge id="e17" source="d856d6d1-ea91-11ec-90c7-eff83c975df3" target="785cddb0-eacd-11ec-8072-efa4c5a6e66d">
337
+ <data key="e_type">INCIDENT_LINK</data>
338
+ <data key="e_timestamp">1655127100</data>
339
+ <data key="e_label_binary">malicious</data>
340
+ <data key="e_label_confidence">0.9208984375</data>
341
+ <data key="e_suspicion_score">0.9208984375</data>
342
+ <data key="e_mo_name">Data Theft</data>
343
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
344
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
345
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
346
+ <data key="e_lifecycle_stage">complete-mission</data>
347
+ <data key="e_disposition">Disrupted</data>
348
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
349
+ </edge>
350
+ <edge id="e18" source="785cddb0-eacd-11ec-8072-efa4c5a6e66d" target="d856d6d1-ea91-11ec-90c7-eff83c975df3">
351
+ <data key="e_type">INCIDENT_LINK</data>
352
+ <data key="e_timestamp">1655127100</data>
353
+ <data key="e_label_binary">malicious</data>
354
+ <data key="e_label_confidence">0.9208984375</data>
355
+ <data key="e_suspicion_score">0.9208984375</data>
356
+ <data key="e_mo_name">Data Theft</data>
357
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
358
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
359
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
360
+ <data key="e_lifecycle_stage">complete-mission</data>
361
+ <data key="e_disposition">Disrupted</data>
362
+ <data key="e_incident_id">285ac8e0-eb1d-11ec-80a1-dd24f7271411</data>
363
+ </edge>
364
+ </graph>
365
+ </graphml>
graph/incidents_graphml/2/285bfc70-899a-11ee-bba1-ef6459fc1a52.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.200.243</data>
35
+ <data key="n_hostname">172.30.200.243</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="aa768b04-062b-11ee-b370-89369b0fb41d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.2</data>
43
+ <data key="n_hostname">100.64.8.2</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2706" target="aa768b04-062b-11ee-b370-89369b0fb41d">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700700569</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">285bfc70-899a-11ee-bba1-ef6459fc1a52</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/285d8f90-12a8-11ee-9cb5-514a509424ae.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8e527090-0628-11ee-b144-2b760827f5b0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.48.138</data>
35
+ <data key="n_hostname">100.64.48.138</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="8e527090-0628-11ee-b144-2b760827f5b0" target="HOST-2759">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687622393</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">285d8f90-12a8-11ee-9cb5-514a509424ae</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/2875f200-eb1d-11ec-80a1-dd24f7271411.graphml ADDED
@@ -0,0 +1,207 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e67bbff0-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.74.137</data>
35
+ <data key="n_hostname">100.64.74.137</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="e1d6f000-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.14.34</data>
43
+ <data key="n_hostname">USER-0015-1332.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <node id="f4986bb0-ea91-11ec-90c7-eff83c975df3">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.72.91</data>
51
+ <data key="n_hostname">100.64.72.91</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="7a38fb40-eace-11ec-95f7-d7b19253be01">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.74.138</data>
59
+ <data key="n_hostname">USER-0015-1689.example.internal</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.83125</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="e348f690-ea91-11ec-abf7-619673fe2558">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.71.126</data>
67
+ <data key="n_hostname">100.64.71.126</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.71875</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <node id="e1e547e0-ea91-11ec-90c7-eff83c975df3">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.9.46</data>
75
+ <data key="n_hostname">USER-0015-1484.example.internal</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","Meraki"]</data>
79
+ </node>
80
+ <edge id="e1" source="e67bbff0-ea91-11ec-90c7-eff83c975df3" target="e1d6f000-ea91-11ec-90c7-eff83c975df3">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1655127100</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.841796875</data>
85
+ <data key="e_suspicion_score">0.841796875</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Disrupted</data>
92
+ <data key="e_incident_id">2875f200-eb1d-11ec-80a1-dd24f7271411</data>
93
+ </edge>
94
+ <edge id="e2" source="e1d6f000-ea91-11ec-90c7-eff83c975df3" target="e67bbff0-ea91-11ec-90c7-eff83c975df3">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1655127100</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.841796875</data>
99
+ <data key="e_suspicion_score">0.841796875</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Disrupted</data>
106
+ <data key="e_incident_id">2875f200-eb1d-11ec-80a1-dd24f7271411</data>
107
+ </edge>
108
+ <edge id="e3" source="e1d6f000-ea91-11ec-90c7-eff83c975df3" target="HOST-13609">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1655127100</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.841796875</data>
113
+ <data key="e_suspicion_score">0.841796875</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Disrupted</data>
120
+ <data key="e_incident_id">2875f200-eb1d-11ec-80a1-dd24f7271411</data>
121
+ </edge>
122
+ <edge id="e4" source="HOST-13609" target="e1d6f000-ea91-11ec-90c7-eff83c975df3">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1655127100</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.841796875</data>
127
+ <data key="e_suspicion_score">0.841796875</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Disrupted</data>
134
+ <data key="e_incident_id">2875f200-eb1d-11ec-80a1-dd24f7271411</data>
135
+ </edge>
136
+ <edge id="e5" source="7a38fb40-eace-11ec-95f7-d7b19253be01" target="HOST-13609">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1655127100</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.841796875</data>
141
+ <data key="e_suspicion_score">0.841796875</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Disrupted</data>
148
+ <data key="e_incident_id">2875f200-eb1d-11ec-80a1-dd24f7271411</data>
149
+ </edge>
150
+ <edge id="e6" source="HOST-13609" target="7a38fb40-eace-11ec-95f7-d7b19253be01">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1655127100</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.841796875</data>
155
+ <data key="e_suspicion_score">0.841796875</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Disrupted</data>
162
+ <data key="e_incident_id">2875f200-eb1d-11ec-80a1-dd24f7271411</data>
163
+ </edge>
164
+ <edge id="e7" source="e1d6f000-ea91-11ec-90c7-eff83c975df3" target="HOST-12696">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1655127100</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.841796875</data>
169
+ <data key="e_suspicion_score">0.841796875</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Disrupted</data>
176
+ <data key="e_incident_id">2875f200-eb1d-11ec-80a1-dd24f7271411</data>
177
+ </edge>
178
+ <edge id="e8" source="HOST-12696" target="e1d6f000-ea91-11ec-90c7-eff83c975df3">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1655127100</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.841796875</data>
183
+ <data key="e_suspicion_score">0.841796875</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Disrupted</data>
190
+ <data key="e_incident_id">2875f200-eb1d-11ec-80a1-dd24f7271411</data>
191
+ </edge>
192
+ <edge id="e9" source="e67bbff0-ea91-11ec-90c7-eff83c975df3" target="e1e547e0-ea91-11ec-90c7-eff83c975df3">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1655127100</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.841796875</data>
197
+ <data key="e_suspicion_score">0.841796875</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Disrupted</data>
204
+ <data key="e_incident_id">2875f200-eb1d-11ec-80a1-dd24f7271411</data>
205
+ </edge>
206
+ </graph>
207
+ </graphml>
graph/incidents_graphml/2/28861ea0-eb1d-11ec-80a1-dd24f7271411.graphml ADDED
@@ -0,0 +1,517 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8c80e680-ea94-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.26.231</data>
35
+ <data key="n_hostname">100.64.26.231</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.9208984375</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <node id="d8eb4cd0-eacc-11ec-b221-559da7f9ea5f">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.74.139</data>
51
+ <data key="n_hostname">USER-0015-1690.example.internal</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="6c1643c0-eac8-11ec-8c74-6b06deac3937">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.70.239</data>
59
+ <data key="n_hostname">USER-0015-1607.example.internal</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.4375</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="14d1dcc0-ea94-11ec-abf7-619673fe2558">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.74.140</data>
67
+ <data key="n_hostname">USER-0015-1691.example.internal</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.4375</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <node id="d424eb20-eacc-11ec-b7a5-5531868c3bea">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.74.141</data>
75
+ <data key="n_hostname">USER-0015-1692.example.internal</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.4375</data>
78
+ <data key="n_products">["Precinct","Meraki"]</data>
79
+ </node>
80
+ <node id="ab7a7f90-eacd-11ec-b5f9-f94203472ff7">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.74.142</data>
83
+ <data key="n_hostname">USER-0015-1693.example.internal</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.4375</data>
86
+ <data key="n_products">["Precinct","Meraki"]</data>
87
+ </node>
88
+ <node id="3cc8ca70-eacd-11ec-a878-cd146b9ba48b">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.74.143</data>
91
+ <data key="n_hostname">USER-0015-1694.example.internal</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.4375</data>
94
+ <data key="n_products">["Precinct","Meraki"]</data>
95
+ </node>
96
+ <node id="61c6f150-ea94-11ec-abf7-619673fe2558">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.74.144</data>
99
+ <data key="n_hostname">USER-0015-1695.example.internal</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.4375</data>
102
+ <data key="n_products">["Precinct","Meraki"]</data>
103
+ </node>
104
+ <node id="2bba5060-ea95-11ec-abf7-619673fe2558">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.73.163</data>
107
+ <data key="n_hostname">USER-0015-1696.example.internal</data>
108
+ <data key="n_set_roles">["Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.4375</data>
110
+ <data key="n_products">["Precinct","Meraki"]</data>
111
+ </node>
112
+ <node id="c8aa2880-eace-11ec-a5b6-6b11051b7706">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.74.145</data>
115
+ <data key="n_hostname">USER-0015-1697.example.internal</data>
116
+ <data key="n_set_roles">["Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.4375</data>
118
+ <data key="n_products">["Precinct","Meraki"]</data>
119
+ </node>
120
+ <node id="00e67fb0-ea97-11ec-abf7-619673fe2558">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.74.146</data>
123
+ <data key="n_hostname">USER-0015-1698.example.internal</data>
124
+ <data key="n_set_roles">["Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.4375</data>
126
+ <data key="n_products">["Precinct","Meraki"]</data>
127
+ </node>
128
+ <node id="2b932b40-ea93-11ec-90c7-eff83c975df3">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.74.147</data>
131
+ <data key="n_hostname">USER-0015-1699.example.internal</data>
132
+ <data key="n_set_roles">["Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.4375</data>
134
+ <data key="n_products">["Precinct","Meraki"]</data>
135
+ </node>
136
+ <node id="321745b0-ea97-11ec-90c7-eff83c975df3">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.74.148</data>
139
+ <data key="n_hostname">USER-0015-1700.example.internal</data>
140
+ <data key="n_set_roles">["Exploiting Host"]</data>
141
+ <data key="n_suspicion_score">0.4375</data>
142
+ <data key="n_products">["Precinct","Meraki"]</data>
143
+ </node>
144
+ <node id="d284ca20-ea94-11ec-90c7-eff83c975df3">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.73.118</data>
147
+ <data key="n_hostname">USER-0015-1701.example.internal</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.4375</data>
150
+ <data key="n_products">["Precinct","Meraki"]</data>
151
+ </node>
152
+ <edge id="e1" source="8c80e680-ea94-11ec-90c7-eff83c975df3" target="HOST-12604">
153
+ <data key="e_type">INCIDENT_LINK</data>
154
+ <data key="e_timestamp">1655127100</data>
155
+ <data key="e_label_binary">malicious</data>
156
+ <data key="e_label_confidence">0.9208984375</data>
157
+ <data key="e_suspicion_score">0.9208984375</data>
158
+ <data key="e_mo_name">Data Theft</data>
159
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
160
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
161
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
162
+ <data key="e_lifecycle_stage">complete-mission</data>
163
+ <data key="e_disposition">Disrupted</data>
164
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
165
+ </edge>
166
+ <edge id="e2" source="HOST-12604" target="8c80e680-ea94-11ec-90c7-eff83c975df3">
167
+ <data key="e_type">INCIDENT_LINK</data>
168
+ <data key="e_timestamp">1655127100</data>
169
+ <data key="e_label_binary">malicious</data>
170
+ <data key="e_label_confidence">0.9208984375</data>
171
+ <data key="e_suspicion_score">0.9208984375</data>
172
+ <data key="e_mo_name">Data Theft</data>
173
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
174
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
175
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
176
+ <data key="e_lifecycle_stage">complete-mission</data>
177
+ <data key="e_disposition">Disrupted</data>
178
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
179
+ </edge>
180
+ <edge id="e3" source="d8eb4cd0-eacc-11ec-b221-559da7f9ea5f" target="HOST-12604">
181
+ <data key="e_type">INCIDENT_LINK</data>
182
+ <data key="e_timestamp">1655127100</data>
183
+ <data key="e_label_binary">malicious</data>
184
+ <data key="e_label_confidence">0.9208984375</data>
185
+ <data key="e_suspicion_score">0.9208984375</data>
186
+ <data key="e_mo_name">Data Theft</data>
187
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
188
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
189
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
190
+ <data key="e_lifecycle_stage">complete-mission</data>
191
+ <data key="e_disposition">Disrupted</data>
192
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
193
+ </edge>
194
+ <edge id="e4" source="HOST-12604" target="d8eb4cd0-eacc-11ec-b221-559da7f9ea5f">
195
+ <data key="e_type">INCIDENT_LINK</data>
196
+ <data key="e_timestamp">1655127100</data>
197
+ <data key="e_label_binary">malicious</data>
198
+ <data key="e_label_confidence">0.9208984375</data>
199
+ <data key="e_suspicion_score">0.9208984375</data>
200
+ <data key="e_mo_name">Data Theft</data>
201
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
202
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
203
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
204
+ <data key="e_lifecycle_stage">complete-mission</data>
205
+ <data key="e_disposition">Disrupted</data>
206
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
207
+ </edge>
208
+ <edge id="e5" source="HOST-12604" target="HOST-12608">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1655127100</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.9208984375</data>
213
+ <data key="e_suspicion_score">0.9208984375</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Disrupted</data>
220
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
221
+ </edge>
222
+ <edge id="e6" source="14d1dcc0-ea94-11ec-abf7-619673fe2558" target="HOST-12604">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1655127100</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.9208984375</data>
227
+ <data key="e_suspicion_score">0.9208984375</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Disrupted</data>
234
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
235
+ </edge>
236
+ <edge id="e7" source="HOST-12604" target="14d1dcc0-ea94-11ec-abf7-619673fe2558">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1655127100</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.9208984375</data>
241
+ <data key="e_suspicion_score">0.9208984375</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Disrupted</data>
248
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
249
+ </edge>
250
+ <edge id="e8" source="d424eb20-eacc-11ec-b7a5-5531868c3bea" target="HOST-12604">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1655127100</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.9208984375</data>
255
+ <data key="e_suspicion_score">0.9208984375</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Disrupted</data>
262
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
263
+ </edge>
264
+ <edge id="e9" source="HOST-12604" target="d424eb20-eacc-11ec-b7a5-5531868c3bea">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1655127100</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.9208984375</data>
269
+ <data key="e_suspicion_score">0.9208984375</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Disrupted</data>
276
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
277
+ </edge>
278
+ <edge id="e10" source="ab7a7f90-eacd-11ec-b5f9-f94203472ff7" target="HOST-12604">
279
+ <data key="e_type">INCIDENT_LINK</data>
280
+ <data key="e_timestamp">1655127100</data>
281
+ <data key="e_label_binary">malicious</data>
282
+ <data key="e_label_confidence">0.9208984375</data>
283
+ <data key="e_suspicion_score">0.9208984375</data>
284
+ <data key="e_mo_name">Data Theft</data>
285
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
286
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
287
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
288
+ <data key="e_lifecycle_stage">complete-mission</data>
289
+ <data key="e_disposition">Disrupted</data>
290
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
291
+ </edge>
292
+ <edge id="e11" source="HOST-12604" target="ab7a7f90-eacd-11ec-b5f9-f94203472ff7">
293
+ <data key="e_type">INCIDENT_LINK</data>
294
+ <data key="e_timestamp">1655127100</data>
295
+ <data key="e_label_binary">malicious</data>
296
+ <data key="e_label_confidence">0.9208984375</data>
297
+ <data key="e_suspicion_score">0.9208984375</data>
298
+ <data key="e_mo_name">Data Theft</data>
299
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
300
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
301
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
302
+ <data key="e_lifecycle_stage">complete-mission</data>
303
+ <data key="e_disposition">Disrupted</data>
304
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
305
+ </edge>
306
+ <edge id="e12" source="3cc8ca70-eacd-11ec-a878-cd146b9ba48b" target="HOST-12604">
307
+ <data key="e_type">INCIDENT_LINK</data>
308
+ <data key="e_timestamp">1655127100</data>
309
+ <data key="e_label_binary">malicious</data>
310
+ <data key="e_label_confidence">0.9208984375</data>
311
+ <data key="e_suspicion_score">0.9208984375</data>
312
+ <data key="e_mo_name">Data Theft</data>
313
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
314
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
315
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
316
+ <data key="e_lifecycle_stage">complete-mission</data>
317
+ <data key="e_disposition">Disrupted</data>
318
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
319
+ </edge>
320
+ <edge id="e13" source="HOST-12604" target="3cc8ca70-eacd-11ec-a878-cd146b9ba48b">
321
+ <data key="e_type">INCIDENT_LINK</data>
322
+ <data key="e_timestamp">1655127100</data>
323
+ <data key="e_label_binary">malicious</data>
324
+ <data key="e_label_confidence">0.9208984375</data>
325
+ <data key="e_suspicion_score">0.9208984375</data>
326
+ <data key="e_mo_name">Data Theft</data>
327
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
328
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
329
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
330
+ <data key="e_lifecycle_stage">complete-mission</data>
331
+ <data key="e_disposition">Disrupted</data>
332
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
333
+ </edge>
334
+ <edge id="e14" source="61c6f150-ea94-11ec-abf7-619673fe2558" target="HOST-12604">
335
+ <data key="e_type">INCIDENT_LINK</data>
336
+ <data key="e_timestamp">1655127100</data>
337
+ <data key="e_label_binary">malicious</data>
338
+ <data key="e_label_confidence">0.9208984375</data>
339
+ <data key="e_suspicion_score">0.9208984375</data>
340
+ <data key="e_mo_name">Data Theft</data>
341
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
342
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
343
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
344
+ <data key="e_lifecycle_stage">complete-mission</data>
345
+ <data key="e_disposition">Disrupted</data>
346
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
347
+ </edge>
348
+ <edge id="e15" source="HOST-12604" target="61c6f150-ea94-11ec-abf7-619673fe2558">
349
+ <data key="e_type">INCIDENT_LINK</data>
350
+ <data key="e_timestamp">1655127100</data>
351
+ <data key="e_label_binary">malicious</data>
352
+ <data key="e_label_confidence">0.9208984375</data>
353
+ <data key="e_suspicion_score">0.9208984375</data>
354
+ <data key="e_mo_name">Data Theft</data>
355
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
356
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
357
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
358
+ <data key="e_lifecycle_stage">complete-mission</data>
359
+ <data key="e_disposition">Disrupted</data>
360
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
361
+ </edge>
362
+ <edge id="e16" source="2bba5060-ea95-11ec-abf7-619673fe2558" target="HOST-12604">
363
+ <data key="e_type">INCIDENT_LINK</data>
364
+ <data key="e_timestamp">1655127100</data>
365
+ <data key="e_label_binary">malicious</data>
366
+ <data key="e_label_confidence">0.9208984375</data>
367
+ <data key="e_suspicion_score">0.9208984375</data>
368
+ <data key="e_mo_name">Data Theft</data>
369
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
370
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
371
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
372
+ <data key="e_lifecycle_stage">complete-mission</data>
373
+ <data key="e_disposition">Disrupted</data>
374
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
375
+ </edge>
376
+ <edge id="e17" source="HOST-12604" target="2bba5060-ea95-11ec-abf7-619673fe2558">
377
+ <data key="e_type">INCIDENT_LINK</data>
378
+ <data key="e_timestamp">1655127100</data>
379
+ <data key="e_label_binary">malicious</data>
380
+ <data key="e_label_confidence">0.9208984375</data>
381
+ <data key="e_suspicion_score">0.9208984375</data>
382
+ <data key="e_mo_name">Data Theft</data>
383
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
384
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
385
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
386
+ <data key="e_lifecycle_stage">complete-mission</data>
387
+ <data key="e_disposition">Disrupted</data>
388
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
389
+ </edge>
390
+ <edge id="e18" source="c8aa2880-eace-11ec-a5b6-6b11051b7706" target="HOST-12604">
391
+ <data key="e_type">INCIDENT_LINK</data>
392
+ <data key="e_timestamp">1655127100</data>
393
+ <data key="e_label_binary">malicious</data>
394
+ <data key="e_label_confidence">0.9208984375</data>
395
+ <data key="e_suspicion_score">0.9208984375</data>
396
+ <data key="e_mo_name">Data Theft</data>
397
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
398
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
399
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
400
+ <data key="e_lifecycle_stage">complete-mission</data>
401
+ <data key="e_disposition">Disrupted</data>
402
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
403
+ </edge>
404
+ <edge id="e19" source="HOST-12604" target="c8aa2880-eace-11ec-a5b6-6b11051b7706">
405
+ <data key="e_type">INCIDENT_LINK</data>
406
+ <data key="e_timestamp">1655127100</data>
407
+ <data key="e_label_binary">malicious</data>
408
+ <data key="e_label_confidence">0.9208984375</data>
409
+ <data key="e_suspicion_score">0.9208984375</data>
410
+ <data key="e_mo_name">Data Theft</data>
411
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
412
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
413
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
414
+ <data key="e_lifecycle_stage">complete-mission</data>
415
+ <data key="e_disposition">Disrupted</data>
416
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
417
+ </edge>
418
+ <edge id="e20" source="HOST-12604" target="00e67fb0-ea97-11ec-abf7-619673fe2558">
419
+ <data key="e_type">INCIDENT_LINK</data>
420
+ <data key="e_timestamp">1655127100</data>
421
+ <data key="e_label_binary">malicious</data>
422
+ <data key="e_label_confidence">0.9208984375</data>
423
+ <data key="e_suspicion_score">0.9208984375</data>
424
+ <data key="e_mo_name">Data Theft</data>
425
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
426
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
427
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
428
+ <data key="e_lifecycle_stage">complete-mission</data>
429
+ <data key="e_disposition">Disrupted</data>
430
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
431
+ </edge>
432
+ <edge id="e21" source="2b932b40-ea93-11ec-90c7-eff83c975df3" target="HOST-12604">
433
+ <data key="e_type">INCIDENT_LINK</data>
434
+ <data key="e_timestamp">1655127100</data>
435
+ <data key="e_label_binary">malicious</data>
436
+ <data key="e_label_confidence">0.9208984375</data>
437
+ <data key="e_suspicion_score">0.9208984375</data>
438
+ <data key="e_mo_name">Data Theft</data>
439
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
440
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
441
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
442
+ <data key="e_lifecycle_stage">complete-mission</data>
443
+ <data key="e_disposition">Disrupted</data>
444
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
445
+ </edge>
446
+ <edge id="e22" source="HOST-12604" target="2b932b40-ea93-11ec-90c7-eff83c975df3">
447
+ <data key="e_type">INCIDENT_LINK</data>
448
+ <data key="e_timestamp">1655127100</data>
449
+ <data key="e_label_binary">malicious</data>
450
+ <data key="e_label_confidence">0.9208984375</data>
451
+ <data key="e_suspicion_score">0.9208984375</data>
452
+ <data key="e_mo_name">Data Theft</data>
453
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
454
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
455
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
456
+ <data key="e_lifecycle_stage">complete-mission</data>
457
+ <data key="e_disposition">Disrupted</data>
458
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
459
+ </edge>
460
+ <edge id="e23" source="321745b0-ea97-11ec-90c7-eff83c975df3" target="HOST-12604">
461
+ <data key="e_type">INCIDENT_LINK</data>
462
+ <data key="e_timestamp">1655127100</data>
463
+ <data key="e_label_binary">malicious</data>
464
+ <data key="e_label_confidence">0.9208984375</data>
465
+ <data key="e_suspicion_score">0.9208984375</data>
466
+ <data key="e_mo_name">Data Theft</data>
467
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
468
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
469
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
470
+ <data key="e_lifecycle_stage">complete-mission</data>
471
+ <data key="e_disposition">Disrupted</data>
472
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
473
+ </edge>
474
+ <edge id="e24" source="HOST-12604" target="321745b0-ea97-11ec-90c7-eff83c975df3">
475
+ <data key="e_type">INCIDENT_LINK</data>
476
+ <data key="e_timestamp">1655127100</data>
477
+ <data key="e_label_binary">malicious</data>
478
+ <data key="e_label_confidence">0.9208984375</data>
479
+ <data key="e_suspicion_score">0.9208984375</data>
480
+ <data key="e_mo_name">Data Theft</data>
481
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
482
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
483
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
484
+ <data key="e_lifecycle_stage">complete-mission</data>
485
+ <data key="e_disposition">Disrupted</data>
486
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
487
+ </edge>
488
+ <edge id="e25" source="d284ca20-ea94-11ec-90c7-eff83c975df3" target="HOST-12604">
489
+ <data key="e_type">INCIDENT_LINK</data>
490
+ <data key="e_timestamp">1655127100</data>
491
+ <data key="e_label_binary">malicious</data>
492
+ <data key="e_label_confidence">0.9208984375</data>
493
+ <data key="e_suspicion_score">0.9208984375</data>
494
+ <data key="e_mo_name">Data Theft</data>
495
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
496
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
497
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
498
+ <data key="e_lifecycle_stage">complete-mission</data>
499
+ <data key="e_disposition">Disrupted</data>
500
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
501
+ </edge>
502
+ <edge id="e26" source="HOST-12604" target="d284ca20-ea94-11ec-90c7-eff83c975df3">
503
+ <data key="e_type">INCIDENT_LINK</data>
504
+ <data key="e_timestamp">1655127100</data>
505
+ <data key="e_label_binary">malicious</data>
506
+ <data key="e_label_confidence">0.9208984375</data>
507
+ <data key="e_suspicion_score">0.9208984375</data>
508
+ <data key="e_mo_name">Data Theft</data>
509
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
510
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
511
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
512
+ <data key="e_lifecycle_stage">complete-mission</data>
513
+ <data key="e_disposition">Disrupted</data>
514
+ <data key="e_incident_id">28861ea0-eb1d-11ec-80a1-dd24f7271411</data>
515
+ </edge>
516
+ </graph>
517
+ </graphml>
graph/incidents_graphml/2/2889a3d0-5760-11ee-b4dd-e56c30c12cd4.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a7e2ac92-3545-11ee-907f-0f1ab6cc31b3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.13.57</data>
35
+ <data key="n_hostname">USER-0015-1203.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.54.66</data>
43
+ <data key="n_hostname">172.24.54.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.30.200.243</data>
51
+ <data key="n_hostname">172.30.200.243</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-3631" target="HOST-2745">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1695178100</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">2889a3d0-5760-11ee-b4dd-e56c30c12cd4</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-3631" target="HOST-2706">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1695178100</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">2889a3d0-5760-11ee-b4dd-e56c30c12cd4</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/2/289a8b50-4e6e-11ee-81d4-670b4c6897d4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5ceaf517-0626-11ee-87d2-5909d78e9e20">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.4.77</data>
35
+ <data key="n_hostname">100.64.4.77</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-5551" target="HOST-2759">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694194553</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">289a8b50-4e6e-11ee-81d4-670b4c6897d4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/289edf80-ee7c-11ee-8c82-b10f259979aa.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="18ac6042-bc11-11ee-ac27-e9705dbd23a1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.26.167</data>
35
+ <data key="n_hostname">100.64.26.167</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.40.149</data>
43
+ <data key="n_hostname">172.29.40.149</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.31.182.227</data>
51
+ <data key="n_hostname">172.31.182.227</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="18ac6042-bc11-11ee-ac27-e9705dbd23a1" target="HOST-2834">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1711792752</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">289edf80-ee7c-11ee-8c82-b10f259979aa</data>
69
+ </edge>
70
+ <edge id="e2" source="18ac6042-bc11-11ee-ac27-e9705dbd23a1" target="HOST-2761">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1711792752</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">289edf80-ee7c-11ee-8c82-b10f259979aa</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/2/28abc960-4e6e-11ee-81d4-670b4c6897d4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="5ceaf517-0626-11ee-87d2-5909d78e9e20">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.4.77</data>
43
+ <data key="n_hostname">100.64.4.77</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-5551">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694194553</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">28abc960-4e6e-11ee-81d4-670b4c6897d4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/28adefd0-22ca-11ee-a717-3b672dfcef5e.graphml ADDED
@@ -0,0 +1,221 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8c322470-062f-11ee-93cb-d5eb556fa913">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.47.180</data>
35
+ <data key="n_hostname">100.64.47.180</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.168.229</data>
43
+ <data key="n_hostname">172.23.168.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="d953d160-06aa-11ee-a57e-015beccba3db">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.47.181</data>
51
+ <data key="n_hostname">100.64.47.181</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="8701fe17-0627-11ee-b19f-ed665a42340f">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.47.182</data>
59
+ <data key="n_hostname">100.64.47.182</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="b0378a94-1377-11ee-ad09-396e93d95fc2">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.47.183</data>
67
+ <data key="n_hostname">100.64.47.183</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.7890625</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="76f704f3-0629-11ee-a510-47d18ec77e75">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.20.142</data>
75
+ <data key="n_hostname">100.64.20.142</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.7890625</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <edge id="e1" source="8c322470-062f-11ee-93cb-d5eb556fa913" target="HOST-2865">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1689396215</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.841796875</data>
85
+ <data key="e_suspicion_score">0.841796875</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Disrupted</data>
92
+ <data key="e_incident_id">28adefd0-22ca-11ee-a717-3b672dfcef5e</data>
93
+ </edge>
94
+ <edge id="e2" source="HOST-2865" target="8c322470-062f-11ee-93cb-d5eb556fa913">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1689396215</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.841796875</data>
99
+ <data key="e_suspicion_score">0.841796875</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Disrupted</data>
106
+ <data key="e_incident_id">28adefd0-22ca-11ee-a717-3b672dfcef5e</data>
107
+ </edge>
108
+ <edge id="e3" source="d953d160-06aa-11ee-a57e-015beccba3db" target="HOST-2865">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1689396215</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.841796875</data>
113
+ <data key="e_suspicion_score">0.841796875</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Disrupted</data>
120
+ <data key="e_incident_id">28adefd0-22ca-11ee-a717-3b672dfcef5e</data>
121
+ </edge>
122
+ <edge id="e4" source="HOST-2865" target="d953d160-06aa-11ee-a57e-015beccba3db">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1689396215</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.841796875</data>
127
+ <data key="e_suspicion_score">0.841796875</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Disrupted</data>
134
+ <data key="e_incident_id">28adefd0-22ca-11ee-a717-3b672dfcef5e</data>
135
+ </edge>
136
+ <edge id="e5" source="8701fe17-0627-11ee-b19f-ed665a42340f" target="HOST-2865">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1689396215</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.841796875</data>
141
+ <data key="e_suspicion_score">0.841796875</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Disrupted</data>
148
+ <data key="e_incident_id">28adefd0-22ca-11ee-a717-3b672dfcef5e</data>
149
+ </edge>
150
+ <edge id="e6" source="HOST-2865" target="8701fe17-0627-11ee-b19f-ed665a42340f">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1689396215</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.841796875</data>
155
+ <data key="e_suspicion_score">0.841796875</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Disrupted</data>
162
+ <data key="e_incident_id">28adefd0-22ca-11ee-a717-3b672dfcef5e</data>
163
+ </edge>
164
+ <edge id="e7" source="b0378a94-1377-11ee-ad09-396e93d95fc2" target="HOST-2865">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1689396215</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.841796875</data>
169
+ <data key="e_suspicion_score">0.841796875</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Disrupted</data>
176
+ <data key="e_incident_id">28adefd0-22ca-11ee-a717-3b672dfcef5e</data>
177
+ </edge>
178
+ <edge id="e8" source="HOST-2865" target="b0378a94-1377-11ee-ad09-396e93d95fc2">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1689396215</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.841796875</data>
183
+ <data key="e_suspicion_score">0.841796875</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Disrupted</data>
190
+ <data key="e_incident_id">28adefd0-22ca-11ee-a717-3b672dfcef5e</data>
191
+ </edge>
192
+ <edge id="e9" source="HOST-4539" target="HOST-2865">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1689396215</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.841796875</data>
197
+ <data key="e_suspicion_score">0.841796875</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Disrupted</data>
204
+ <data key="e_incident_id">28adefd0-22ca-11ee-a717-3b672dfcef5e</data>
205
+ </edge>
206
+ <edge id="e10" source="HOST-2865" target="HOST-4539">
207
+ <data key="e_type">INCIDENT_LINK</data>
208
+ <data key="e_timestamp">1689396215</data>
209
+ <data key="e_label_binary">malicious</data>
210
+ <data key="e_label_confidence">0.841796875</data>
211
+ <data key="e_suspicion_score">0.841796875</data>
212
+ <data key="e_mo_name">Data Theft</data>
213
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
214
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
215
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
216
+ <data key="e_lifecycle_stage">complete-mission</data>
217
+ <data key="e_disposition">Disrupted</data>
218
+ <data key="e_incident_id">28adefd0-22ca-11ee-a717-3b672dfcef5e</data>
219
+ </edge>
220
+ </graph>
221
+ </graphml>
graph/incidents_graphml/2/28b21960-ee7c-11ee-8c82-b10f259979aa.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.40.149</data>
35
+ <data key="n_hostname">172.29.40.149</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="18ac6042-bc11-11ee-ac27-e9705dbd23a1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.26.167</data>
43
+ <data key="n_hostname">100.64.26.167</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2834" target="HOST-5395">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1711792752</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">28b21960-ee7c-11ee-8c82-b10f259979aa</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/28bba7e0-4e6e-11ee-81d4-670b4c6897d4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d17e7930-1f9c-11ee-be4e-1d54e381a600">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.35.223</data>
43
+ <data key="n_hostname">100.64.35.223</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="HOST-6644">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694194553</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">28bba7e0-4e6e-11ee-81d4-670b4c6897d4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/28c28850-889b-11ee-9ada-6590fb922310.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5999e274-204a-11ee-859b-8b138d130ab0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.39.122</data>
35
+ <data key="n_hostname">100.64.39.122</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.26.73.92</data>
43
+ <data key="n_hostname">172.26.73.92</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-7133" target="HOST-2724">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700591048</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">28c28850-889b-11ee-9ada-6590fb922310</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/28ce9fa0-1aa5-11ee-ae54-3b636b49055b.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0a6b1d61-0626-11ee-be28-81bd3518d47e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">192.168.229.176</data>
35
+ <data key="n_hostname">192.168.229.176</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="37820d42-0ce8-11ee-b1fa-9d81188617ef">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.86.26</data>
43
+ <data key="n_hostname">USER-0015-1975.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="0a6b1d61-0626-11ee-be28-81bd3518d47e" target="HOST-17130">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688500715</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.4375</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">28ce9fa0-1aa5-11ee-ae54-3b636b49055b</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-17130" target="0a6b1d61-0626-11ee-be28-81bd3518d47e">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1688500715</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.4375</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">28ce9fa0-1aa5-11ee-ae54-3b636b49055b</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/2/28d23fc0-889b-11ee-9ada-6590fb922310.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.26.73.92</data>
35
+ <data key="n_hostname">172.26.73.92</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="5999e274-204a-11ee-859b-8b138d130ab0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.39.122</data>
43
+ <data key="n_hostname">100.64.39.122</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2724" target="HOST-7133">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700591048</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">28d23fc0-889b-11ee-9ada-6590fb922310</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/28df0400-696d-11ee-99bd-0777ff256373.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="025969b2-696d-11ee-9621-f7e3959675e8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.67.211</data>
43
+ <data key="n_hostname">100.64.67.211</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="025969b2-696d-11ee-9621-f7e3959675e8">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697162805</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">28df0400-696d-11ee-99bd-0777ff256373</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/28ec4a70-696d-11ee-99bd-0777ff256373.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1b07a382-65dc-11ee-a940-336e4d07e00f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.67.214</data>
35
+ <data key="n_hostname">100.64.67.214</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.232.220</data>
43
+ <data key="n_hostname">172.16.232.220</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.30.201.119</data>
51
+ <data key="n_hostname">172.30.201.119</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="1b07a382-65dc-11ee-a940-336e4d07e00f" target="HOST-2748">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1697162805</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">28ec4a70-696d-11ee-99bd-0777ff256373</data>
69
+ </edge>
70
+ <edge id="e2" source="1b07a382-65dc-11ee-a940-336e4d07e00f" target="HOST-2760">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1697162805</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">28ec4a70-696d-11ee-99bd-0777ff256373</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/2/28f1daf0-791f-11ee-91ac-9dbe9218e297.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="770711ea-0626-11ee-9f36-61ae8743c399">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.9</data>
35
+ <data key="n_hostname">100.64.68.9</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
39
+ </node>
40
+ <node id="480ecf34-51b3-11ee-bc1f-8d229a6064cb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.22.167</data>
43
+ <data key="n_hostname">100.64.22.167</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11383" target="HOST-11935">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698888523</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">28f1daf0-791f-11ee-91ac-9dbe9218e297</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-11935" target="HOST-11383">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1698888523</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">28f1daf0-791f-11ee-91ac-9dbe9218e297</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/2/28f7d680-a813-11ee-99fc-3f84722b2bdf.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9407641b-a762-11ee-a2d6-3316070d85e7">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.245</data>
35
+ <data key="n_hostname">100.64.68.245</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="c9c2af89-0625-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.10</data>
43
+ <data key="n_hostname">100.64.68.10</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Protect","CASB"]</data>
47
+ </node>
48
+ <edge id="e1" source="9407641b-a762-11ee-a2d6-3316070d85e7" target="HOST-11380">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1704051074</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">28f7d680-a813-11ee-99fc-3f84722b2bdf</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/28f83c90-1ca6-11ee-8a30-871cf58c099a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="77c2b636-0625-11ee-a48a-ff0b3de2e266">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.96.216.116</data>
35
+ <data key="n_hostname">10.96.216.116</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2d2acb82-0625-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.78.41</data>
43
+ <data key="n_hostname">172.31.78.41</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4370" target="HOST-2807">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688721047</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">28f83c90-1ca6-11ee-8a30-871cf58c099a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/28fabcb0-a813-11ee-99fc-3f84722b2bdf.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c9c2af89-0625-11ee-9f36-61ae8743c399">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.10</data>
35
+ <data key="n_hostname">100.64.68.10</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","Protect","CASB"]</data>
39
+ </node>
40
+ <node id="9407641b-a762-11ee-a2d6-3316070d85e7">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.245</data>
43
+ <data key="n_hostname">100.64.68.245</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11380" target="HOST-11859">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1704051074</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">28fabcb0-a813-11ee-99fc-3f84722b2bdf</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/28fb1780-696d-11ee-99bd-0777ff256373.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1b07a382-65dc-11ee-a940-336e4d07e00f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.67.214</data>
43
+ <data key="n_hostname">100.64.67.214</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2748" target="HOST-11341">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697162805</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">28fb1780-696d-11ee-99bd-0777ff256373</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/2908d320-696d-11ee-99bd-0777ff256373.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1599ff03-4071-11ee-9772-e1b9e7daf5d7">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.67.212</data>
35
+ <data key="n_hostname">100.64.67.212</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.27.202.53</data>
51
+ <data key="n_hostname">172.27.202.53</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="1599ff03-4071-11ee-9772-e1b9e7daf5d7" target="HOST-2759">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1697162805</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">2908d320-696d-11ee-99bd-0777ff256373</data>
69
+ </edge>
70
+ <edge id="e2" source="1599ff03-4071-11ee-9772-e1b9e7daf5d7" target="HOST-2703">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1697162805</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">2908d320-696d-11ee-99bd-0777ff256373</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/2/290ab520-eb63-11ec-8162-f7a03e680dde.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="28781212-eb63-11ec-b871-59213e8c77ac">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.81.236</data>
35
+ <data key="n_hostname">100.64.81.236</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="13988450-ea92-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.73.85</data>
43
+ <data key="n_hostname">100.64.73.85</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="28781212-eb63-11ec-b871-59213e8c77ac" target="HOST-14538">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1655157166</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">290ab520-eb63-11ec-8162-f7a03e680dde</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/290c2e30-9e15-11ee-a5ab-8550688be6fd.graphml ADDED
@@ -0,0 +1,221 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b644e702-83cc-11ee-a0dd-5d3ec7402b20">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.26.171</data>
35
+ <data key="n_hostname">100.64.26.171</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.49375</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="be6bda84-0625-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.22</data>
43
+ <data key="n_hostname">100.64.68.22</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <node id="ad484219-1233-11ee-a01d-9167f2bbf2af">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.70.154</data>
51
+ <data key="n_hostname">100.64.70.154</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.49375</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <node id="3e1a77f7-0626-11ee-a31e-2bbd16ce2d59">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.68.65</data>
59
+ <data key="n_hostname">100.64.68.65</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.746875</data>
62
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]</data>
63
+ </node>
64
+ <node id="0aba10c1-8d6a-11ee-a2eb-d9a054caf72a">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.13.80</data>
67
+ <data key="n_hostname">100.64.13.80</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.746875</data>
70
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
71
+ </node>
72
+ <node id="e2617212-2beb-11ee-9edf-2b60e0010c03">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.68.21</data>
75
+ <data key="n_hostname">100.64.68.21</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.49375</data>
78
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
79
+ </node>
80
+ <edge id="e1" source="HOST-11527" target="HOST-11392">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1702952421</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.746875</data>
85
+ <data key="e_suspicion_score">0.746875</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Disrupted</data>
92
+ <data key="e_incident_id">290c2e30-9e15-11ee-a5ab-8550688be6fd</data>
93
+ </edge>
94
+ <edge id="e2" source="HOST-11392" target="HOST-11527">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1702952421</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.746875</data>
99
+ <data key="e_suspicion_score">0.746875</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Disrupted</data>
106
+ <data key="e_incident_id">290c2e30-9e15-11ee-a5ab-8550688be6fd</data>
107
+ </edge>
108
+ <edge id="e3" source="ad484219-1233-11ee-a01d-9167f2bbf2af" target="HOST-11454">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1702952421</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.746875</data>
113
+ <data key="e_suspicion_score">0.746875</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Disrupted</data>
120
+ <data key="e_incident_id">290c2e30-9e15-11ee-a5ab-8550688be6fd</data>
121
+ </edge>
122
+ <edge id="e4" source="HOST-11454" target="ad484219-1233-11ee-a01d-9167f2bbf2af">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1702952421</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.746875</data>
127
+ <data key="e_suspicion_score">0.746875</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Disrupted</data>
134
+ <data key="e_incident_id">290c2e30-9e15-11ee-a5ab-8550688be6fd</data>
135
+ </edge>
136
+ <edge id="e5" source="0aba10c1-8d6a-11ee-a2eb-d9a054caf72a" target="HOST-11454">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1702952421</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.746875</data>
141
+ <data key="e_suspicion_score">0.746875</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Disrupted</data>
148
+ <data key="e_incident_id">290c2e30-9e15-11ee-a5ab-8550688be6fd</data>
149
+ </edge>
150
+ <edge id="e6" source="HOST-11454" target="0aba10c1-8d6a-11ee-a2eb-d9a054caf72a">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1702952421</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.746875</data>
155
+ <data key="e_suspicion_score">0.746875</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Disrupted</data>
162
+ <data key="e_incident_id">290c2e30-9e15-11ee-a5ab-8550688be6fd</data>
163
+ </edge>
164
+ <edge id="e7" source="HOST-11527" target="HOST-11454">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1702952421</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.746875</data>
169
+ <data key="e_suspicion_score">0.746875</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Disrupted</data>
176
+ <data key="e_incident_id">290c2e30-9e15-11ee-a5ab-8550688be6fd</data>
177
+ </edge>
178
+ <edge id="e8" source="HOST-11454" target="HOST-11527">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1702952421</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.746875</data>
183
+ <data key="e_suspicion_score">0.746875</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Disrupted</data>
190
+ <data key="e_incident_id">290c2e30-9e15-11ee-a5ab-8550688be6fd</data>
191
+ </edge>
192
+ <edge id="e9" source="HOST-11391" target="HOST-11392">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1702952421</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.746875</data>
197
+ <data key="e_suspicion_score">0.746875</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Disrupted</data>
204
+ <data key="e_incident_id">290c2e30-9e15-11ee-a5ab-8550688be6fd</data>
205
+ </edge>
206
+ <edge id="e10" source="HOST-11392" target="HOST-11391">
207
+ <data key="e_type">INCIDENT_LINK</data>
208
+ <data key="e_timestamp">1702952421</data>
209
+ <data key="e_label_binary">malicious</data>
210
+ <data key="e_label_confidence">0.746875</data>
211
+ <data key="e_suspicion_score">0.746875</data>
212
+ <data key="e_mo_name">Data Theft</data>
213
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
214
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
215
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
216
+ <data key="e_lifecycle_stage">complete-mission</data>
217
+ <data key="e_disposition">Disrupted</data>
218
+ <data key="e_incident_id">290c2e30-9e15-11ee-a5ab-8550688be6fd</data>
219
+ </edge>
220
+ </graph>
221
+ </graphml>
graph/incidents_graphml/2/29125360-4e6e-11ee-81d4-670b4c6897d4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e4407050-2fd2-11ee-a843-5f25ac05f17c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.11.134</data>
35
+ <data key="n_hostname">100.64.11.134</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.101.1</data>
43
+ <data key="n_hostname">172.31.101.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3458" target="HOST-2821">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694194553</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">29125360-4e6e-11ee-81d4-670b4c6897d4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/29181560-696d-11ee-99bd-0777ff256373.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1599ff03-4071-11ee-9772-e1b9e7daf5d7">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.67.212</data>
43
+ <data key="n_hostname">100.64.67.212</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-11342">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697162805</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">29181560-696d-11ee-99bd-0777ff256373</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/292195a0-4e6e-11ee-81d4-670b4c6897d4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.101.1</data>
35
+ <data key="n_hostname">172.31.101.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="e4407050-2fd2-11ee-a843-5f25ac05f17c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.11.134</data>
43
+ <data key="n_hostname">100.64.11.134</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2821" target="HOST-3458">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694194553</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">292195a0-4e6e-11ee-81d4-670b4c6897d4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/2925d100-696d-11ee-99bd-0777ff256373.graphml ADDED
@@ -0,0 +1,107 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.200.243</data>
35
+ <data key="n_hostname">172.30.200.243</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="672d3023-51b1-11ee-8a7d-ff18061dc4f4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.17.226</data>
43
+ <data key="n_hostname">100.64.17.226</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.30.201.119</data>
51
+ <data key="n_hostname">172.30.201.119</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.24.54.66</data>
59
+ <data key="n_hostname">172.24.54.66</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <edge id="e1" source="HOST-2706" target="HOST-4178">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1697162805</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.7</data>
69
+ <data key="e_suspicion_score">0.25</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Unprocessed</data>
76
+ <data key="e_incident_id">2925d100-696d-11ee-99bd-0777ff256373</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-4178" target="HOST-2760">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1697162805</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.7</data>
83
+ <data key="e_suspicion_score">0.25</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Unprocessed</data>
90
+ <data key="e_incident_id">2925d100-696d-11ee-99bd-0777ff256373</data>
91
+ </edge>
92
+ <edge id="e3" source="HOST-4178" target="HOST-2745">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1697162805</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.7</data>
97
+ <data key="e_suspicion_score">0.25</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Unprocessed</data>
104
+ <data key="e_incident_id">2925d100-696d-11ee-99bd-0777ff256373</data>
105
+ </edge>
106
+ </graph>
107
+ </graphml>
graph/incidents_graphml/2/292df1b0-4e6e-11ee-81d4-670b4c6897d4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a7704cb2-0627-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.66.58</data>
35
+ <data key="n_hostname">100.64.66.58</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.200.243</data>
43
+ <data key="n_hostname">172.30.200.243</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="a7704cb2-0627-11ee-bea9-5f52a09eb73a" target="HOST-2706">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694194553</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">292df1b0-4e6e-11ee-81d4-670b4c6897d4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/293b3820-4e6e-11ee-81d4-670b4c6897d4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.200.243</data>
35
+ <data key="n_hostname">172.30.200.243</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a7704cb2-0627-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.66.58</data>
43
+ <data key="n_hostname">100.64.66.58</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2706" target="HOST-11105">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694194554</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">293b3820-4e6e-11ee-81d4-670b4c6897d4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/294259b0-696d-11ee-99bd-0777ff256373.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a6bc2871-2a85-11ee-8e07-d7c2d31f07be">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.67.220</data>
35
+ <data key="n_hostname">100.64.67.220</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.117.12.163</data>
43
+ <data key="n_hostname">10.117.12.163</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="a6bc2871-2a85-11ee-8e07-d7c2d31f07be" target="HOST-2773">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697162806</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">294259b0-696d-11ee-99bd-0777ff256373</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/29427560-7d24-11ee-b619-8bfdf25c0d9a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="51aaee41-7c18-11ee-b343-d3eec82a2e0d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.39.35</data>
35
+ <data key="n_hostname">100.64.39.35</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.26.73.92</data>
43
+ <data key="n_hostname">172.26.73.92</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="51aaee41-7c18-11ee-b343-d3eec82a2e0d" target="HOST-2724">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699330476</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">29427560-7d24-11ee-b619-8bfdf25c0d9a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/2948b480-654a-11ee-a13a-239f8a76841b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="70350811-062e-11ee-b54c-95b58759d9fd">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.44.143</data>
35
+ <data key="n_hostname">100.64.44.143</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.18.38.152</data>
43
+ <data key="n_hostname">172.18.38.152</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-7864" target="HOST-2844">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696707969</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">2948b480-654a-11ee-a13a-239f8a76841b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/29519090-7d24-11ee-b619-8bfdf25c0d9a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.26.73.92</data>
35
+ <data key="n_hostname">172.26.73.92</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="51aaee41-7c18-11ee-b343-d3eec82a2e0d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.39.35</data>
43
+ <data key="n_hostname">100.64.39.35</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2724" target="HOST-7084">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699330476</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">29519090-7d24-11ee-b619-8bfdf25c0d9a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/2956b240-eb63-11ec-8162-f7a03e680dde.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0ec50340-ea92-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.73.59</data>
35
+ <data key="n_hostname">100.64.73.59</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="efd8fbe6-eb62-11ec-ac2e-b559889ad223">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.81.237</data>
43
+ <data key="n_hostname">100.64.81.237</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.83125</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-13222" target="efd8fbe6-eb62-11ec-ac2e-b559889ad223">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1655157166</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.83125</data>
53
+ <data key="e_suspicion_score">0.83125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">2956b240-eb63-11ec-8162-f7a03e680dde</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/295993f0-085a-11ef-81c9-bbab78bb4e36.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a68c0c31-281e-11ee-8fba-fd7894b61cab">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.17.98.67</data>
35
+ <data key="n_hostname">172.17.98.67</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="f6509a08-0628-11ee-bc2f-8356f14253be">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.87.78</data>
43
+ <data key="n_hostname">100.64.87.78</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="a68c0c31-281e-11ee-8fba-fd7894b61cab" target="f6509a08-0628-11ee-bc2f-8356f14253be">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714636880</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">295993f0-085a-11ef-81c9-bbab78bb4e36</data>
61
+ </edge>
62
+ <edge id="e2" source="f6509a08-0628-11ee-bc2f-8356f14253be" target="a68c0c31-281e-11ee-8fba-fd7894b61cab">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1714636880</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">295993f0-085a-11ef-81c9-bbab78bb4e36</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/2/29599f50-0a43-11ee-bdb0-15a1612d17d2.graphml ADDED
@@ -0,0 +1,337 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="287f6bf0-0a43-11ee-915a-33a950af135d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.30.55</data>
35
+ <data key="n_hostname">100.64.30.55</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f4-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.135.251.191</data>
43
+ <data key="n_hostname">10.135.251.191</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="f5f49421-0624-11ee-bb6d-91e4d286acbc">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.12.61</data>
51
+ <data key="n_hostname">100.64.12.61</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="930d4961-0971-11ee-bf14-5d5a2567e526">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.28.239</data>
59
+ <data key="n_hostname">100.64.28.239</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">172.31.182.227</data>
67
+ <data key="n_hostname">172.31.182.227</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.71875</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="a82dbc61-063f-11ee-87ed-d1b50ed5527d">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.30.56</data>
75
+ <data key="n_hostname">100.64.30.56</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="eb553d62-0626-11ee-a48a-ff0b3de2e266">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.23.45</data>
83
+ <data key="n_hostname">100.64.23.45</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">172.24.247.113</data>
91
+ <data key="n_hostname">172.24.247.113</data>
92
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.7890625</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="ae6813b0-062f-11ee-9db7-09758cf804b1">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.30.57</data>
99
+ <data key="n_hostname">100.64.30.57</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="a7bf5e72-0624-11ee-b35a-9d13f89576c6">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.18.1</data>
107
+ <data key="n_hostname">100.64.18.1</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.7890625</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <edge id="e1" source="HOST-5909" target="HOST-2751">
113
+ <data key="e_type">INCIDENT_LINK</data>
114
+ <data key="e_timestamp">1686699406</data>
115
+ <data key="e_label_binary">malicious</data>
116
+ <data key="e_label_confidence">0.7890625</data>
117
+ <data key="e_suspicion_score">0.7890625</data>
118
+ <data key="e_mo_name">Data Theft</data>
119
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
120
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
121
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
122
+ <data key="e_lifecycle_stage">complete-mission</data>
123
+ <data key="e_disposition">Disrupted</data>
124
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
125
+ </edge>
126
+ <edge id="e2" source="HOST-2751" target="HOST-5909">
127
+ <data key="e_type">INCIDENT_LINK</data>
128
+ <data key="e_timestamp">1686699406</data>
129
+ <data key="e_label_binary">malicious</data>
130
+ <data key="e_label_confidence">0.7890625</data>
131
+ <data key="e_suspicion_score">0.7890625</data>
132
+ <data key="e_mo_name">Data Theft</data>
133
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
134
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
135
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
136
+ <data key="e_lifecycle_stage">complete-mission</data>
137
+ <data key="e_disposition">Disrupted</data>
138
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
139
+ </edge>
140
+ <edge id="e3" source="HOST-5746" target="HOST-2751">
141
+ <data key="e_type">INCIDENT_LINK</data>
142
+ <data key="e_timestamp">1686699406</data>
143
+ <data key="e_label_binary">malicious</data>
144
+ <data key="e_label_confidence">0.7890625</data>
145
+ <data key="e_suspicion_score">0.7890625</data>
146
+ <data key="e_mo_name">Data Theft</data>
147
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
148
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
149
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
150
+ <data key="e_lifecycle_stage">complete-mission</data>
151
+ <data key="e_disposition">Disrupted</data>
152
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
153
+ </edge>
154
+ <edge id="e4" source="HOST-2751" target="HOST-5746">
155
+ <data key="e_type">INCIDENT_LINK</data>
156
+ <data key="e_timestamp">1686699406</data>
157
+ <data key="e_label_binary">malicious</data>
158
+ <data key="e_label_confidence">0.7890625</data>
159
+ <data key="e_suspicion_score">0.7890625</data>
160
+ <data key="e_mo_name">Data Theft</data>
161
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
162
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
163
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
164
+ <data key="e_lifecycle_stage">complete-mission</data>
165
+ <data key="e_disposition">Disrupted</data>
166
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
167
+ </edge>
168
+ <edge id="e5" source="HOST-2751" target="HOST-5733">
169
+ <data key="e_type">INCIDENT_LINK</data>
170
+ <data key="e_timestamp">1686699406</data>
171
+ <data key="e_label_binary">malicious</data>
172
+ <data key="e_label_confidence">0.7890625</data>
173
+ <data key="e_suspicion_score">0.7890625</data>
174
+ <data key="e_mo_name">Data Theft</data>
175
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
176
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
177
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
178
+ <data key="e_lifecycle_stage">complete-mission</data>
179
+ <data key="e_disposition">Disrupted</data>
180
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
181
+ </edge>
182
+ <edge id="e6" source="HOST-5733" target="HOST-2751">
183
+ <data key="e_type">INCIDENT_LINK</data>
184
+ <data key="e_timestamp">1686699406</data>
185
+ <data key="e_label_binary">malicious</data>
186
+ <data key="e_label_confidence">0.7890625</data>
187
+ <data key="e_suspicion_score">0.7890625</data>
188
+ <data key="e_mo_name">Data Theft</data>
189
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
190
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
191
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
192
+ <data key="e_lifecycle_stage">complete-mission</data>
193
+ <data key="e_disposition">Disrupted</data>
194
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
195
+ </edge>
196
+ <edge id="e7" source="HOST-2761" target="HOST-5910">
197
+ <data key="e_type">INCIDENT_LINK</data>
198
+ <data key="e_timestamp">1686699406</data>
199
+ <data key="e_label_binary">malicious</data>
200
+ <data key="e_label_confidence">0.7890625</data>
201
+ <data key="e_suspicion_score">0.7890625</data>
202
+ <data key="e_mo_name">Data Theft</data>
203
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
204
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
205
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
206
+ <data key="e_lifecycle_stage">complete-mission</data>
207
+ <data key="e_disposition">Disrupted</data>
208
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
209
+ </edge>
210
+ <edge id="e8" source="HOST-5910" target="HOST-2761">
211
+ <data key="e_type">INCIDENT_LINK</data>
212
+ <data key="e_timestamp">1686699406</data>
213
+ <data key="e_label_binary">malicious</data>
214
+ <data key="e_label_confidence">0.7890625</data>
215
+ <data key="e_suspicion_score">0.7890625</data>
216
+ <data key="e_mo_name">Data Theft</data>
217
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
218
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
219
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
220
+ <data key="e_lifecycle_stage">complete-mission</data>
221
+ <data key="e_disposition">Disrupted</data>
222
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
223
+ </edge>
224
+ <edge id="e9" source="HOST-5909" target="HOST-2761">
225
+ <data key="e_type">INCIDENT_LINK</data>
226
+ <data key="e_timestamp">1686699406</data>
227
+ <data key="e_label_binary">malicious</data>
228
+ <data key="e_label_confidence">0.7890625</data>
229
+ <data key="e_suspicion_score">0.7890625</data>
230
+ <data key="e_mo_name">Data Theft</data>
231
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
232
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
233
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
234
+ <data key="e_lifecycle_stage">complete-mission</data>
235
+ <data key="e_disposition">Disrupted</data>
236
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
237
+ </edge>
238
+ <edge id="e10" source="HOST-2761" target="HOST-5909">
239
+ <data key="e_type">INCIDENT_LINK</data>
240
+ <data key="e_timestamp">1686699406</data>
241
+ <data key="e_label_binary">malicious</data>
242
+ <data key="e_label_confidence">0.7890625</data>
243
+ <data key="e_suspicion_score">0.7890625</data>
244
+ <data key="e_mo_name">Data Theft</data>
245
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
246
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
247
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
248
+ <data key="e_lifecycle_stage">complete-mission</data>
249
+ <data key="e_disposition">Disrupted</data>
250
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
251
+ </edge>
252
+ <edge id="e11" source="HOST-4898" target="HOST-2759">
253
+ <data key="e_type">INCIDENT_LINK</data>
254
+ <data key="e_timestamp">1686699406</data>
255
+ <data key="e_label_binary">malicious</data>
256
+ <data key="e_label_confidence">0.7890625</data>
257
+ <data key="e_suspicion_score">0.7890625</data>
258
+ <data key="e_mo_name">Data Theft</data>
259
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
260
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
261
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
262
+ <data key="e_lifecycle_stage">complete-mission</data>
263
+ <data key="e_disposition">Disrupted</data>
264
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
265
+ </edge>
266
+ <edge id="e12" source="HOST-2759" target="HOST-4898">
267
+ <data key="e_type">INCIDENT_LINK</data>
268
+ <data key="e_timestamp">1686699406</data>
269
+ <data key="e_label_binary">malicious</data>
270
+ <data key="e_label_confidence">0.7890625</data>
271
+ <data key="e_suspicion_score">0.7890625</data>
272
+ <data key="e_mo_name">Data Theft</data>
273
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
274
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
275
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
276
+ <data key="e_lifecycle_stage">complete-mission</data>
277
+ <data key="e_disposition">Disrupted</data>
278
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
279
+ </edge>
280
+ <edge id="e13" source="HOST-5911" target="HOST-2759">
281
+ <data key="e_type">INCIDENT_LINK</data>
282
+ <data key="e_timestamp">1686699406</data>
283
+ <data key="e_label_binary">malicious</data>
284
+ <data key="e_label_confidence">0.7890625</data>
285
+ <data key="e_suspicion_score">0.7890625</data>
286
+ <data key="e_mo_name">Data Theft</data>
287
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
288
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
289
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
290
+ <data key="e_lifecycle_stage">complete-mission</data>
291
+ <data key="e_disposition">Disrupted</data>
292
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
293
+ </edge>
294
+ <edge id="e14" source="HOST-2759" target="HOST-5911">
295
+ <data key="e_type">INCIDENT_LINK</data>
296
+ <data key="e_timestamp">1686699406</data>
297
+ <data key="e_label_binary">malicious</data>
298
+ <data key="e_label_confidence">0.7890625</data>
299
+ <data key="e_suspicion_score">0.7890625</data>
300
+ <data key="e_mo_name">Data Theft</data>
301
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
302
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
303
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
304
+ <data key="e_lifecycle_stage">complete-mission</data>
305
+ <data key="e_disposition">Disrupted</data>
306
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
307
+ </edge>
308
+ <edge id="e15" source="HOST-5912" target="HOST-2759">
309
+ <data key="e_type">INCIDENT_LINK</data>
310
+ <data key="e_timestamp">1686699406</data>
311
+ <data key="e_label_binary">malicious</data>
312
+ <data key="e_label_confidence">0.7890625</data>
313
+ <data key="e_suspicion_score">0.7890625</data>
314
+ <data key="e_mo_name">Data Theft</data>
315
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
316
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
317
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
318
+ <data key="e_lifecycle_stage">complete-mission</data>
319
+ <data key="e_disposition">Disrupted</data>
320
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
321
+ </edge>
322
+ <edge id="e16" source="HOST-2759" target="HOST-5912">
323
+ <data key="e_type">INCIDENT_LINK</data>
324
+ <data key="e_timestamp">1686699406</data>
325
+ <data key="e_label_binary">malicious</data>
326
+ <data key="e_label_confidence">0.7890625</data>
327
+ <data key="e_suspicion_score">0.7890625</data>
328
+ <data key="e_mo_name">Data Theft</data>
329
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
330
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
331
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
332
+ <data key="e_lifecycle_stage">complete-mission</data>
333
+ <data key="e_disposition">Disrupted</data>
334
+ <data key="e_incident_id">29599f50-0a43-11ee-bdb0-15a1612d17d2</data>
335
+ </edge>
336
+ </graph>
337
+ </graphml>
graph/incidents_graphml/2/295b0400-654a-11ee-a13a-239f8a76841b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.18.38.152</data>
35
+ <data key="n_hostname">172.18.38.152</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="70350811-062e-11ee-b54c-95b58759d9fd">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.44.143</data>
43
+ <data key="n_hostname">100.64.44.143</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2844" target="HOST-7864">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696707969</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">295b0400-654a-11ee-a13a-239f8a76841b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/29682e30-533c-11ed-82ec-e7a72760a0c9.graphml ADDED
@@ -0,0 +1,357 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="109b74c2-533c-11ed-9fc0-1d5b81a8df6e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.95.23</data>
35
+ <data key="n_hostname">100.64.95.23</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ab8980b3-02a8-11ed-bb89-45c059e92558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.9208984375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <node id="0769fd83-4235-11ed-a4ce-d1205037bee8">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.95.24</data>
51
+ <data key="n_hostname">100.64.95.24</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="305e32d3-41b1-11ed-937b-8359e3378579">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.10.202</data>
59
+ <data key="n_hostname">100.64.10.202</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
63
+ </node>
64
+ <node id="ce2a5030-11d1-11ed-a918-0918322bb6a8">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.95.25</data>
67
+ <data key="n_hostname">100.64.95.25</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="116c4fb6-0363-11ed-84c3-21ea2c3a41d2">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.24.108</data>
75
+ <data key="n_hostname">100.64.24.108</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="3c187006-0786-11ed-8113-758327ea9794">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.95.26</data>
83
+ <data key="n_hostname">100.64.95.26</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.4375</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="f206c1e3-51ab-11ed-bb16-f1e1d74f8ed9">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.95.27</data>
91
+ <data key="n_hostname">100.64.95.27</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.7890625</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="ae463fd2-4e90-11ed-8f75-e1a9f3f71d9a">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.95.28</data>
99
+ <data key="n_hostname">100.64.95.28</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.578125</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <edge id="e1" source="109b74c2-533c-11ed-9fc0-1d5b81a8df6e" target="HOST-16881">
105
+ <data key="e_type">INCIDENT_LINK</data>
106
+ <data key="e_timestamp">1666575337</data>
107
+ <data key="e_label_binary">malicious</data>
108
+ <data key="e_label_confidence">0.9208984375</data>
109
+ <data key="e_suspicion_score">0.9208984375</data>
110
+ <data key="e_mo_name">Data Theft</data>
111
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
112
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
113
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
114
+ <data key="e_lifecycle_stage">complete-mission</data>
115
+ <data key="e_disposition">Disrupted</data>
116
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
117
+ </edge>
118
+ <edge id="e2" source="HOST-16881" target="109b74c2-533c-11ed-9fc0-1d5b81a8df6e">
119
+ <data key="e_type">INCIDENT_LINK</data>
120
+ <data key="e_timestamp">1666575337</data>
121
+ <data key="e_label_binary">malicious</data>
122
+ <data key="e_label_confidence">0.9208984375</data>
123
+ <data key="e_suspicion_score">0.9208984375</data>
124
+ <data key="e_mo_name">Data Theft</data>
125
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
126
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
127
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
128
+ <data key="e_lifecycle_stage">complete-mission</data>
129
+ <data key="e_disposition">Disrupted</data>
130
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
131
+ </edge>
132
+ <edge id="e3" source="0769fd83-4235-11ed-a4ce-d1205037bee8" target="HOST-16881">
133
+ <data key="e_type">INCIDENT_LINK</data>
134
+ <data key="e_timestamp">1666575337</data>
135
+ <data key="e_label_binary">malicious</data>
136
+ <data key="e_label_confidence">0.9208984375</data>
137
+ <data key="e_suspicion_score">0.9208984375</data>
138
+ <data key="e_mo_name">Data Theft</data>
139
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
140
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
141
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
142
+ <data key="e_lifecycle_stage">complete-mission</data>
143
+ <data key="e_disposition">Disrupted</data>
144
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
145
+ </edge>
146
+ <edge id="e4" source="HOST-16881" target="0769fd83-4235-11ed-a4ce-d1205037bee8">
147
+ <data key="e_type">INCIDENT_LINK</data>
148
+ <data key="e_timestamp">1666575337</data>
149
+ <data key="e_label_binary">malicious</data>
150
+ <data key="e_label_confidence">0.9208984375</data>
151
+ <data key="e_suspicion_score">0.9208984375</data>
152
+ <data key="e_mo_name">Data Theft</data>
153
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
154
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
155
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
156
+ <data key="e_lifecycle_stage">complete-mission</data>
157
+ <data key="e_disposition">Disrupted</data>
158
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
159
+ </edge>
160
+ <edge id="e5" source="305e32d3-41b1-11ed-937b-8359e3378579" target="HOST-16881">
161
+ <data key="e_type">INCIDENT_LINK</data>
162
+ <data key="e_timestamp">1666575337</data>
163
+ <data key="e_label_binary">malicious</data>
164
+ <data key="e_label_confidence">0.9208984375</data>
165
+ <data key="e_suspicion_score">0.9208984375</data>
166
+ <data key="e_mo_name">Data Theft</data>
167
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
168
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
169
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
170
+ <data key="e_lifecycle_stage">complete-mission</data>
171
+ <data key="e_disposition">Disrupted</data>
172
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
173
+ </edge>
174
+ <edge id="e6" source="HOST-16881" target="305e32d3-41b1-11ed-937b-8359e3378579">
175
+ <data key="e_type">INCIDENT_LINK</data>
176
+ <data key="e_timestamp">1666575337</data>
177
+ <data key="e_label_binary">malicious</data>
178
+ <data key="e_label_confidence">0.9208984375</data>
179
+ <data key="e_suspicion_score">0.9208984375</data>
180
+ <data key="e_mo_name">Data Theft</data>
181
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
182
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
183
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
184
+ <data key="e_lifecycle_stage">complete-mission</data>
185
+ <data key="e_disposition">Disrupted</data>
186
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
187
+ </edge>
188
+ <edge id="e7" source="ce2a5030-11d1-11ed-a918-0918322bb6a8" target="HOST-16881">
189
+ <data key="e_type">INCIDENT_LINK</data>
190
+ <data key="e_timestamp">1666575337</data>
191
+ <data key="e_label_binary">malicious</data>
192
+ <data key="e_label_confidence">0.9208984375</data>
193
+ <data key="e_suspicion_score">0.9208984375</data>
194
+ <data key="e_mo_name">Data Theft</data>
195
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
196
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
197
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
198
+ <data key="e_lifecycle_stage">complete-mission</data>
199
+ <data key="e_disposition">Disrupted</data>
200
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
201
+ </edge>
202
+ <edge id="e8" source="HOST-16881" target="ce2a5030-11d1-11ed-a918-0918322bb6a8">
203
+ <data key="e_type">INCIDENT_LINK</data>
204
+ <data key="e_timestamp">1666575337</data>
205
+ <data key="e_label_binary">malicious</data>
206
+ <data key="e_label_confidence">0.9208984375</data>
207
+ <data key="e_suspicion_score">0.9208984375</data>
208
+ <data key="e_mo_name">Data Theft</data>
209
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
210
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
211
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
212
+ <data key="e_lifecycle_stage">complete-mission</data>
213
+ <data key="e_disposition">Disrupted</data>
214
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
215
+ </edge>
216
+ <edge id="e9" source="116c4fb6-0363-11ed-84c3-21ea2c3a41d2" target="HOST-16881">
217
+ <data key="e_type">INCIDENT_LINK</data>
218
+ <data key="e_timestamp">1666575337</data>
219
+ <data key="e_label_binary">malicious</data>
220
+ <data key="e_label_confidence">0.9208984375</data>
221
+ <data key="e_suspicion_score">0.9208984375</data>
222
+ <data key="e_mo_name">Data Theft</data>
223
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
224
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
225
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
226
+ <data key="e_lifecycle_stage">complete-mission</data>
227
+ <data key="e_disposition">Disrupted</data>
228
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
229
+ </edge>
230
+ <edge id="e10" source="HOST-16881" target="116c4fb6-0363-11ed-84c3-21ea2c3a41d2">
231
+ <data key="e_type">INCIDENT_LINK</data>
232
+ <data key="e_timestamp">1666575337</data>
233
+ <data key="e_label_binary">malicious</data>
234
+ <data key="e_label_confidence">0.9208984375</data>
235
+ <data key="e_suspicion_score">0.9208984375</data>
236
+ <data key="e_mo_name">Data Theft</data>
237
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
238
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
239
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
240
+ <data key="e_lifecycle_stage">complete-mission</data>
241
+ <data key="e_disposition">Disrupted</data>
242
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
243
+ </edge>
244
+ <edge id="e11" source="3c187006-0786-11ed-8113-758327ea9794" target="HOST-16881">
245
+ <data key="e_type">INCIDENT_LINK</data>
246
+ <data key="e_timestamp">1666575337</data>
247
+ <data key="e_label_binary">malicious</data>
248
+ <data key="e_label_confidence">0.9208984375</data>
249
+ <data key="e_suspicion_score">0.9208984375</data>
250
+ <data key="e_mo_name">Data Theft</data>
251
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
252
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
253
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
254
+ <data key="e_lifecycle_stage">complete-mission</data>
255
+ <data key="e_disposition">Disrupted</data>
256
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
257
+ </edge>
258
+ <edge id="e12" source="HOST-16881" target="3c187006-0786-11ed-8113-758327ea9794">
259
+ <data key="e_type">INCIDENT_LINK</data>
260
+ <data key="e_timestamp">1666575337</data>
261
+ <data key="e_label_binary">malicious</data>
262
+ <data key="e_label_confidence">0.9208984375</data>
263
+ <data key="e_suspicion_score">0.9208984375</data>
264
+ <data key="e_mo_name">Data Theft</data>
265
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
266
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
267
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
268
+ <data key="e_lifecycle_stage">complete-mission</data>
269
+ <data key="e_disposition">Disrupted</data>
270
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
271
+ </edge>
272
+ <edge id="e13" source="HOST-16881" target="f206c1e3-51ab-11ed-bb16-f1e1d74f8ed9">
273
+ <data key="e_type">INCIDENT_LINK</data>
274
+ <data key="e_timestamp">1666575337</data>
275
+ <data key="e_label_binary">malicious</data>
276
+ <data key="e_label_confidence">0.9208984375</data>
277
+ <data key="e_suspicion_score">0.9208984375</data>
278
+ <data key="e_mo_name">Data Theft</data>
279
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
280
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
281
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
282
+ <data key="e_lifecycle_stage">complete-mission</data>
283
+ <data key="e_disposition">Disrupted</data>
284
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
285
+ </edge>
286
+ <edge id="e14" source="f206c1e3-51ab-11ed-bb16-f1e1d74f8ed9" target="HOST-16881">
287
+ <data key="e_type">INCIDENT_LINK</data>
288
+ <data key="e_timestamp">1666575337</data>
289
+ <data key="e_label_binary">malicious</data>
290
+ <data key="e_label_confidence">0.9208984375</data>
291
+ <data key="e_suspicion_score">0.9208984375</data>
292
+ <data key="e_mo_name">Data Theft</data>
293
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
294
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
295
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
296
+ <data key="e_lifecycle_stage">complete-mission</data>
297
+ <data key="e_disposition">Disrupted</data>
298
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
299
+ </edge>
300
+ <edge id="e15" source="f206c1e3-51ab-11ed-bb16-f1e1d74f8ed9" target="HOST-16881">
301
+ <data key="e_type">INCIDENT_LINK</data>
302
+ <data key="e_timestamp">1666575337</data>
303
+ <data key="e_label_binary">malicious</data>
304
+ <data key="e_label_confidence">0.9208984375</data>
305
+ <data key="e_suspicion_score">0.9208984375</data>
306
+ <data key="e_mo_name">Data Theft</data>
307
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
308
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
309
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
310
+ <data key="e_lifecycle_stage">complete-mission</data>
311
+ <data key="e_disposition">Disrupted</data>
312
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
313
+ </edge>
314
+ <edge id="e16" source="HOST-16881" target="f206c1e3-51ab-11ed-bb16-f1e1d74f8ed9">
315
+ <data key="e_type">INCIDENT_LINK</data>
316
+ <data key="e_timestamp">1666575337</data>
317
+ <data key="e_label_binary">malicious</data>
318
+ <data key="e_label_confidence">0.9208984375</data>
319
+ <data key="e_suspicion_score">0.9208984375</data>
320
+ <data key="e_mo_name">Data Theft</data>
321
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
322
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
323
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
324
+ <data key="e_lifecycle_stage">complete-mission</data>
325
+ <data key="e_disposition">Disrupted</data>
326
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
327
+ </edge>
328
+ <edge id="e17" source="ae463fd2-4e90-11ed-8f75-e1a9f3f71d9a" target="HOST-16881">
329
+ <data key="e_type">INCIDENT_LINK</data>
330
+ <data key="e_timestamp">1666575337</data>
331
+ <data key="e_label_binary">malicious</data>
332
+ <data key="e_label_confidence">0.9208984375</data>
333
+ <data key="e_suspicion_score">0.9208984375</data>
334
+ <data key="e_mo_name">Data Theft</data>
335
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
336
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
337
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
338
+ <data key="e_lifecycle_stage">complete-mission</data>
339
+ <data key="e_disposition">Disrupted</data>
340
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
341
+ </edge>
342
+ <edge id="e18" source="HOST-16881" target="ae463fd2-4e90-11ed-8f75-e1a9f3f71d9a">
343
+ <data key="e_type">INCIDENT_LINK</data>
344
+ <data key="e_timestamp">1666575337</data>
345
+ <data key="e_label_binary">malicious</data>
346
+ <data key="e_label_confidence">0.9208984375</data>
347
+ <data key="e_suspicion_score">0.9208984375</data>
348
+ <data key="e_mo_name">Data Theft</data>
349
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
350
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
351
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
352
+ <data key="e_lifecycle_stage">complete-mission</data>
353
+ <data key="e_disposition">Disrupted</data>
354
+ <data key="e_incident_id">29682e30-533c-11ed-82ec-e7a72760a0c9</data>
355
+ </edge>
356
+ </graph>
357
+ </graphml>
graph/incidents_graphml/2/296b3e70-696d-11ee-99bd-0777ff256373.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.117.12.163</data>
35
+ <data key="n_hostname">10.117.12.163</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a6bc2871-2a85-11ee-8e07-d7c2d31f07be">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.67.220</data>
43
+ <data key="n_hostname">100.64.67.220</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2773" target="HOST-11343">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697162806</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">296b3e70-696d-11ee-99bd-0777ff256373</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/296fc7d0-1f6a-11ee-86d7-9d80e15c5f0c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="966b7f79-0938-11ee-9ada-ab14a5cb146d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.2</data>
35
+ <data key="n_hostname">100.64.18.2</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.49375</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="5dff8ed2-0625-11ee-bb59-61e1854d46e6">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.36</data>
43
+ <data key="n_hostname">100.64.68.36</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint CASB"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11448" target="HOST-11409">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689025131</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.6625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">296fc7d0-1f6a-11ee-86d7-9d80e15c5f0c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/2/29709490-718f-11ee-9fe3-bf96143a208f.graphml ADDED
@@ -0,0 +1,185 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bd01fb32-062e-11ee-965d-fbe76c2d01ba">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.21.90</data>
35
+ <data key="n_hostname">100.64.21.90</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.746875</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
39
+ </node>
40
+ <node id="c9c2af8d-0625-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.23</data>
43
+ <data key="n_hostname">100.64.68.23</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
47
+ </node>
48
+ <node id="2c89979a-0627-11ee-b439-453ff354ab99">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.68.43</data>
51
+ <data key="n_hostname">100.64.68.43</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.6625</data>
54
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
55
+ </node>
56
+ <node id="bb5e401a-7107-11ee-91f7-49bbbbcdaa01">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.68.109</data>
59
+ <data key="n_hostname">100.64.68.109</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.49375</data>
62
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
63
+ </node>
64
+ <node id="0718fdd9-2ff7-11ee-b568-55f4178771bf">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.68.110</data>
67
+ <data key="n_hostname">100.64.68.110</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.49375</data>
70
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
71
+ </node>
72
+ <edge id="e1" source="bd01fb32-062e-11ee-965d-fbe76c2d01ba" target="HOST-11393">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1698057018</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.746875</data>
77
+ <data key="e_suspicion_score">0.746875</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Disrupted</data>
84
+ <data key="e_incident_id">29709490-718f-11ee-9fe3-bf96143a208f</data>
85
+ </edge>
86
+ <edge id="e2" source="HOST-11393" target="bd01fb32-062e-11ee-965d-fbe76c2d01ba">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1698057018</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.746875</data>
91
+ <data key="e_suspicion_score">0.746875</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Disrupted</data>
98
+ <data key="e_incident_id">29709490-718f-11ee-9fe3-bf96143a208f</data>
99
+ </edge>
100
+ <edge id="e3" source="bd01fb32-062e-11ee-965d-fbe76c2d01ba" target="HOST-11422">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1698057018</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.746875</data>
105
+ <data key="e_suspicion_score">0.746875</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Disrupted</data>
112
+ <data key="e_incident_id">29709490-718f-11ee-9fe3-bf96143a208f</data>
113
+ </edge>
114
+ <edge id="e4" source="HOST-11422" target="bd01fb32-062e-11ee-965d-fbe76c2d01ba">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1698057018</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.746875</data>
119
+ <data key="e_suspicion_score">0.746875</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Disrupted</data>
126
+ <data key="e_incident_id">29709490-718f-11ee-9fe3-bf96143a208f</data>
127
+ </edge>
128
+ <edge id="e5" source="bb5e401a-7107-11ee-91f7-49bbbbcdaa01" target="HOST-11393">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1698057018</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.746875</data>
133
+ <data key="e_suspicion_score">0.746875</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Disrupted</data>
140
+ <data key="e_incident_id">29709490-718f-11ee-9fe3-bf96143a208f</data>
141
+ </edge>
142
+ <edge id="e6" source="HOST-11393" target="bb5e401a-7107-11ee-91f7-49bbbbcdaa01">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1698057018</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.746875</data>
147
+ <data key="e_suspicion_score">0.746875</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Disrupted</data>
154
+ <data key="e_incident_id">29709490-718f-11ee-9fe3-bf96143a208f</data>
155
+ </edge>
156
+ <edge id="e7" source="0718fdd9-2ff7-11ee-b568-55f4178771bf" target="HOST-11422">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1698057018</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.746875</data>
161
+ <data key="e_suspicion_score">0.746875</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Disrupted</data>
168
+ <data key="e_incident_id">29709490-718f-11ee-9fe3-bf96143a208f</data>
169
+ </edge>
170
+ <edge id="e8" source="HOST-11422" target="0718fdd9-2ff7-11ee-b568-55f4178771bf">
171
+ <data key="e_type">INCIDENT_LINK</data>
172
+ <data key="e_timestamp">1698057018</data>
173
+ <data key="e_label_binary">malicious</data>
174
+ <data key="e_label_confidence">0.746875</data>
175
+ <data key="e_suspicion_score">0.746875</data>
176
+ <data key="e_mo_name">Data Theft</data>
177
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
178
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
179
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
180
+ <data key="e_lifecycle_stage">complete-mission</data>
181
+ <data key="e_disposition">Disrupted</data>
182
+ <data key="e_incident_id">29709490-718f-11ee-9fe3-bf96143a208f</data>
183
+ </edge>
184
+ </graph>
185
+ </graphml>