diff --git a/graph/incidents_graphml/2/28341f50-45d1-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/2/28341f50-45d1-11ee-95ea-81d84bb304b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0302d62a3a52a1212fb6481543fdf31b1983f6f --- /dev/null +++ b/graph/incidents_graphml/2/28341f50-45d1-11ee-95ea-81d84bb304b3.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.168 + 100.64.69.168 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.37.22 + 100.64.37.22 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.33.70 + 100.64.33.70 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.54.94 + 100.64.54.94 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1693247512 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28341f50-45d1-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247512 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28341f50-45d1-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247512 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28341f50-45d1-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247512 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28341f50-45d1-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247512 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28341f50-45d1-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247512 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28341f50-45d1-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247512 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28341f50-45d1-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247512 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28341f50-45d1-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247512 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28341f50-45d1-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247512 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28341f50-45d1-11ee-95ea-81d84bb304b3 + + + diff --git a/graph/incidents_graphml/2/2839cdf0-5793-11ee-97ff-3b19ab007f30.graphml b/graph/incidents_graphml/2/2839cdf0-5793-11ee-97ff-3b19ab007f30.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0df60206c6d8238b34e1a68d515ba2aecf763e5 --- /dev/null +++ b/graph/incidents_graphml/2/2839cdf0-5793-11ee-97ff-3b19ab007f30.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.155 + 100.64.7.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1695200004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2839cdf0-5793-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695200004 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2839cdf0-5793-11ee-97ff-3b19ab007f30 + + + diff --git a/graph/incidents_graphml/2/283b6690-2a82-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/2/283b6690-2a82-11ed-8698-87f85c8d72c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd637238b41cde5f4ad2848276499c992a4141e0 --- /dev/null +++ b/graph/incidents_graphml/2/283b6690-2a82-11ed-8698-87f85c8d72c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.238 + 100.64.86.238 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662097402 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 283b6690-2a82-11ed-8698-87f85c8d72c2 + + + diff --git a/graph/incidents_graphml/2/283d9f00-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/283d9f00-899a-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af6f02fbdd912e8b76b7906ba58224654e4cf03c --- /dev/null +++ b/graph/incidents_graphml/2/283d9f00-899a-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.1 + 100.64.8.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700700568 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 283d9f00-899a-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/2/283f2df0-ff80-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/2/283f2df0-ff80-11ee-b9e5-11c35e54feda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83f0e58ca6814e9f6dbebdae214d164f7c6cb334 --- /dev/null +++ b/graph/incidents_graphml/2/283f2df0-ff80-11ee-b9e5-11c35e54feda.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.70 + 100.64.13.70 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1713663639 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 283f2df0-ff80-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663639 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 283f2df0-ff80-11ee-b9e5-11c35e54feda + + + diff --git a/graph/incidents_graphml/2/284c6c10-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/284c6c10-899a-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95ffc3368db364bd88e920af7dccf98a5dc3cbe1 --- /dev/null +++ b/graph/incidents_graphml/2/284c6c10-899a-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.1 + 100.64.8.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700700568 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 284c6c10-899a-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/2/2852ce80-397f-11ef-bdca-fd3640be1aae.graphml b/graph/incidents_graphml/2/2852ce80-397f-11ef-bdca-fd3640be1aae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f89ec83f5077cdf82abb40101fee71544933e8a7 --- /dev/null +++ b/graph/incidents_graphml/2/2852ce80-397f-11ef-bdca-fd3640be1aae.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.94 + 100.64.25.94 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.127 + 100.64.59.127 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720040377 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2852ce80-397f-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040377 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2852ce80-397f-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040377 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2852ce80-397f-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040377 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2852ce80-397f-11ef-bdca-fd3640be1aae + + + diff --git a/graph/incidents_graphml/2/285ac8e0-eb1d-11ec-80a1-dd24f7271411.graphml b/graph/incidents_graphml/2/285ac8e0-eb1d-11ec-80a1-dd24f7271411.graphml new file mode 100644 index 0000000000000000000000000000000000000000..955a69cd889287643583b77730c985a838a3009a --- /dev/null +++ b/graph/incidents_graphml/2/285ac8e0-eb1d-11ec-80a1-dd24f7271411.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.170 + USER-0015-1679.example.internal + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.118 + USER-0015-1680.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.119 + USER-0015-1681.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.120 + USER-0015-1682.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.121 + USER-0015-1683.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.122 + USER-0015-1684.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.123 + USER-0015-1685.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.124 + USER-0015-1686.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.125 + USER-0015-1687.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.126 + USER-0015-1688.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 285ac8e0-eb1d-11ec-80a1-dd24f7271411 + + + diff --git a/graph/incidents_graphml/2/285bfc70-899a-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/2/285bfc70-899a-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1fdca0a38ce0f5168502cd06998ab6a92807d7e5 --- /dev/null +++ b/graph/incidents_graphml/2/285bfc70-899a-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.2 + 100.64.8.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700700569 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 285bfc70-899a-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/2/285d8f90-12a8-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/2/285d8f90-12a8-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dda24f19441a59f89535ea545ed10dcf9f8aeb6a --- /dev/null +++ b/graph/incidents_graphml/2/285d8f90-12a8-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.138 + 100.64.48.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687622393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 285d8f90-12a8-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/2/2875f200-eb1d-11ec-80a1-dd24f7271411.graphml b/graph/incidents_graphml/2/2875f200-eb1d-11ec-80a1-dd24f7271411.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de8741c2e02a6042c6af14f7858950d08756c2e8 --- /dev/null +++ b/graph/incidents_graphml/2/2875f200-eb1d-11ec-80a1-dd24f7271411.graphml @@ -0,0 +1,207 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.137 + 100.64.74.137 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.14.34 + USER-0015-1332.example.internal + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.91 + 100.64.72.91 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.138 + USER-0015-1689.example.internal + ["Exploiting Host"] + 0.83125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.126 + 100.64.71.126 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.9.46 + USER-0015-1484.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655127100 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2875f200-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2875f200-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2875f200-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2875f200-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2875f200-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2875f200-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2875f200-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2875f200-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2875f200-eb1d-11ec-80a1-dd24f7271411 + + + diff --git a/graph/incidents_graphml/2/28861ea0-eb1d-11ec-80a1-dd24f7271411.graphml b/graph/incidents_graphml/2/28861ea0-eb1d-11ec-80a1-dd24f7271411.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef6f4d6faed33646b294a26bbc52c29391f7412c --- /dev/null +++ b/graph/incidents_graphml/2/28861ea0-eb1d-11ec-80a1-dd24f7271411.graphml @@ -0,0 +1,517 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.231 + 100.64.26.231 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.139 + USER-0015-1690.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.239 + USER-0015-1607.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.140 + USER-0015-1691.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.141 + USER-0015-1692.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.142 + USER-0015-1693.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.143 + USER-0015-1694.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.144 + USER-0015-1695.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.163 + USER-0015-1696.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.145 + USER-0015-1697.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.146 + USER-0015-1698.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.147 + USER-0015-1699.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.148 + USER-0015-1700.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.118 + USER-0015-1701.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127100 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28861ea0-eb1d-11ec-80a1-dd24f7271411 + + + diff --git a/graph/incidents_graphml/2/2889a3d0-5760-11ee-b4dd-e56c30c12cd4.graphml b/graph/incidents_graphml/2/2889a3d0-5760-11ee-b4dd-e56c30c12cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa79c26cf3b2e9372c5394dbd717bd1adc8f1b22 --- /dev/null +++ b/graph/incidents_graphml/2/2889a3d0-5760-11ee-b4dd-e56c30c12cd4.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.57 + USER-0015-1203.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695178100 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2889a3d0-5760-11ee-b4dd-e56c30c12cd4 + + + INCIDENT_LINK + 1695178100 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2889a3d0-5760-11ee-b4dd-e56c30c12cd4 + + + diff --git a/graph/incidents_graphml/2/289a8b50-4e6e-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/2/289a8b50-4e6e-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f9843e1fc2d130b0e36dd2b3b1fae8b2d252a02 --- /dev/null +++ b/graph/incidents_graphml/2/289a8b50-4e6e-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.77 + 100.64.4.77 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694194553 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 289a8b50-4e6e-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/2/289edf80-ee7c-11ee-8c82-b10f259979aa.graphml b/graph/incidents_graphml/2/289edf80-ee7c-11ee-8c82-b10f259979aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5fbb516ee0790e371749a0f8981a9487fe99c7c5 --- /dev/null +++ b/graph/incidents_graphml/2/289edf80-ee7c-11ee-8c82-b10f259979aa.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.167 + 100.64.26.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711792752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 289edf80-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792752 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 289edf80-ee7c-11ee-8c82-b10f259979aa + + + diff --git a/graph/incidents_graphml/2/28abc960-4e6e-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/2/28abc960-4e6e-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf7c3b12cef2fab68758c146828726b1164a7a97 --- /dev/null +++ b/graph/incidents_graphml/2/28abc960-4e6e-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.77 + 100.64.4.77 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694194553 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 28abc960-4e6e-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/2/28adefd0-22ca-11ee-a717-3b672dfcef5e.graphml b/graph/incidents_graphml/2/28adefd0-22ca-11ee-a717-3b672dfcef5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..398f3f1a568b0a946f82f84942049e97f34866b0 --- /dev/null +++ b/graph/incidents_graphml/2/28adefd0-22ca-11ee-a717-3b672dfcef5e.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.180 + 100.64.47.180 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.181 + 100.64.47.181 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.182 + 100.64.47.182 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.183 + 100.64.47.183 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.142 + 100.64.20.142 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689396215 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28adefd0-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396215 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28adefd0-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396215 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28adefd0-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396215 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28adefd0-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396215 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28adefd0-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396215 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28adefd0-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396215 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28adefd0-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396215 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28adefd0-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396215 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28adefd0-22ca-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689396215 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28adefd0-22ca-11ee-a717-3b672dfcef5e + + + diff --git a/graph/incidents_graphml/2/28b21960-ee7c-11ee-8c82-b10f259979aa.graphml b/graph/incidents_graphml/2/28b21960-ee7c-11ee-8c82-b10f259979aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2b7b8b564f1535042b3039e95b53a7c680cbf29 --- /dev/null +++ b/graph/incidents_graphml/2/28b21960-ee7c-11ee-8c82-b10f259979aa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.167 + 100.64.26.167 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711792752 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 28b21960-ee7c-11ee-8c82-b10f259979aa + + + diff --git a/graph/incidents_graphml/2/28bba7e0-4e6e-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/2/28bba7e0-4e6e-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f20d855df30988c331222fcbb79eabbc529d161b --- /dev/null +++ b/graph/incidents_graphml/2/28bba7e0-4e6e-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.223 + 100.64.35.223 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694194553 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 28bba7e0-4e6e-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/2/28c28850-889b-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/2/28c28850-889b-11ee-9ada-6590fb922310.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0382bddd87b3da38d7ff4f99782479adb3951df --- /dev/null +++ b/graph/incidents_graphml/2/28c28850-889b-11ee-9ada-6590fb922310.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.122 + 100.64.39.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700591048 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28c28850-889b-11ee-9ada-6590fb922310 + + + diff --git a/graph/incidents_graphml/2/28ce9fa0-1aa5-11ee-ae54-3b636b49055b.graphml b/graph/incidents_graphml/2/28ce9fa0-1aa5-11ee-ae54-3b636b49055b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f209d1491b3f9cda7ec1602c8b90ca26cfae65f --- /dev/null +++ b/graph/incidents_graphml/2/28ce9fa0-1aa5-11ee-ae54-3b636b49055b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.229.176 + 192.168.229.176 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.26 + USER-0015-1975.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688500715 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28ce9fa0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500715 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 28ce9fa0-1aa5-11ee-ae54-3b636b49055b + + + diff --git a/graph/incidents_graphml/2/28d23fc0-889b-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/2/28d23fc0-889b-11ee-9ada-6590fb922310.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68f24e09e0749a12f92175a3f48c1e215b1a57f4 --- /dev/null +++ b/graph/incidents_graphml/2/28d23fc0-889b-11ee-9ada-6590fb922310.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.122 + 100.64.39.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700591048 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 28d23fc0-889b-11ee-9ada-6590fb922310 + + + diff --git a/graph/incidents_graphml/2/28df0400-696d-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/2/28df0400-696d-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7401918909b57bc3f145726fa7937507d0da057f --- /dev/null +++ b/graph/incidents_graphml/2/28df0400-696d-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.211 + 100.64.67.211 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697162805 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 28df0400-696d-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/2/28ec4a70-696d-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/2/28ec4a70-696d-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5f563004b944eb9f8b93fc8f9d7c738fabae3d8 --- /dev/null +++ b/graph/incidents_graphml/2/28ec4a70-696d-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.214 + 100.64.67.214 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697162805 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 28ec4a70-696d-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697162805 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 28ec4a70-696d-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/2/28f1daf0-791f-11ee-91ac-9dbe9218e297.graphml b/graph/incidents_graphml/2/28f1daf0-791f-11ee-91ac-9dbe9218e297.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ca7272a68bb4761507f76f158f44a8570f3c6d7 --- /dev/null +++ b/graph/incidents_graphml/2/28f1daf0-791f-11ee-91ac-9dbe9218e297.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.22.167 + 100.64.22.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1698888523 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 28f1daf0-791f-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698888523 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 28f1daf0-791f-11ee-91ac-9dbe9218e297 + + + diff --git a/graph/incidents_graphml/2/28f7d680-a813-11ee-99fc-3f84722b2bdf.graphml b/graph/incidents_graphml/2/28f7d680-a813-11ee-99fc-3f84722b2bdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c9930952a17a0f872e83e43466862c8847c11a5 --- /dev/null +++ b/graph/incidents_graphml/2/28f7d680-a813-11ee-99fc-3f84722b2bdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.245 + 100.64.68.245 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1704051074 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 28f7d680-a813-11ee-99fc-3f84722b2bdf + + + diff --git a/graph/incidents_graphml/2/28f83c90-1ca6-11ee-8a30-871cf58c099a.graphml b/graph/incidents_graphml/2/28f83c90-1ca6-11ee-8a30-871cf58c099a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ff24a3eb0f22321a65df448596792dfc1ddd6ce --- /dev/null +++ b/graph/incidents_graphml/2/28f83c90-1ca6-11ee-8a30-871cf58c099a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.96.216.116 + 10.96.216.116 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688721047 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 28f83c90-1ca6-11ee-8a30-871cf58c099a + + + diff --git a/graph/incidents_graphml/2/28fabcb0-a813-11ee-99fc-3f84722b2bdf.graphml b/graph/incidents_graphml/2/28fabcb0-a813-11ee-99fc-3f84722b2bdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b065c266771129f389e61d9d7470bc792cce28b --- /dev/null +++ b/graph/incidents_graphml/2/28fabcb0-a813-11ee-99fc-3f84722b2bdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.68.245 + 100.64.68.245 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1704051074 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 28fabcb0-a813-11ee-99fc-3f84722b2bdf + + + diff --git a/graph/incidents_graphml/2/28fb1780-696d-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/2/28fb1780-696d-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a511d0b6801bae5d1ad927d5fa3ab07cd90c8c65 --- /dev/null +++ b/graph/incidents_graphml/2/28fb1780-696d-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.214 + 100.64.67.214 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697162805 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 28fb1780-696d-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/2/2908d320-696d-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/2/2908d320-696d-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58c514d376a8a4720a82899015f3ef074ae4133b --- /dev/null +++ b/graph/incidents_graphml/2/2908d320-696d-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.212 + 100.64.67.212 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697162805 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2908d320-696d-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697162805 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2908d320-696d-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/2/290ab520-eb63-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/2/290ab520-eb63-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4c2fc546878f17e3788fca5a3d34cee72ca9ec5 --- /dev/null +++ b/graph/incidents_graphml/2/290ab520-eb63-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.236 + 100.64.81.236 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.85 + 100.64.73.85 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655157166 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 290ab520-eb63-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/2/290c2e30-9e15-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/2/290c2e30-9e15-11ee-a5ab-8550688be6fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f87391bf55a3899f301d7af4f6c1071c2b7126e --- /dev/null +++ b/graph/incidents_graphml/2/290c2e30-9e15-11ee-a5ab-8550688be6fd.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.171 + 100.64.26.171 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.70.154 + 100.64.70.154 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.13.80 + 100.64.13.80 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.21 + 100.64.68.21 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1702952421 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 290c2e30-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952421 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 290c2e30-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952421 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 290c2e30-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952421 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 290c2e30-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952421 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 290c2e30-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952421 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 290c2e30-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952421 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 290c2e30-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952421 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 290c2e30-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952421 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 290c2e30-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952421 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 290c2e30-9e15-11ee-a5ab-8550688be6fd + + + diff --git a/graph/incidents_graphml/2/29125360-4e6e-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/2/29125360-4e6e-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ea423b3bde3a482c1083bd0085b46eb35355976 --- /dev/null +++ b/graph/incidents_graphml/2/29125360-4e6e-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694194553 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29125360-4e6e-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/2/29181560-696d-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/2/29181560-696d-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30a178ca0a08c242f3673c83e9c0e08a365036e1 --- /dev/null +++ b/graph/incidents_graphml/2/29181560-696d-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.212 + 100.64.67.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697162805 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 29181560-696d-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/2/292195a0-4e6e-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/2/292195a0-4e6e-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..459103788bffe6299c53169085f4fea1c3a962ad --- /dev/null +++ b/graph/incidents_graphml/2/292195a0-4e6e-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694194553 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 292195a0-4e6e-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/2/2925d100-696d-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/2/2925d100-696d-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d4b09a383ab2a405935d60cb7a8f5c0b6d636c2 --- /dev/null +++ b/graph/incidents_graphml/2/2925d100-696d-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.226 + 100.64.17.226 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697162805 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2925d100-696d-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697162805 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2925d100-696d-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697162805 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2925d100-696d-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/2/292df1b0-4e6e-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/2/292df1b0-4e6e-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92c31aae516a33de7b87ee1b066e122dd87a73c8 --- /dev/null +++ b/graph/incidents_graphml/2/292df1b0-4e6e-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.58 + 100.64.66.58 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694194553 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 292df1b0-4e6e-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/2/293b3820-4e6e-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/2/293b3820-4e6e-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6d799cef76316b26bd432af0cbbee06b7f7b762 --- /dev/null +++ b/graph/incidents_graphml/2/293b3820-4e6e-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.58 + 100.64.66.58 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694194554 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 293b3820-4e6e-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/2/294259b0-696d-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/2/294259b0-696d-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1538fceb31c8073bcf8b66ab549aeb50ed679836 --- /dev/null +++ b/graph/incidents_graphml/2/294259b0-696d-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.220 + 100.64.67.220 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697162806 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 294259b0-696d-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/2/29427560-7d24-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/2/29427560-7d24-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d912bff3d74dfc2a84214934196d292a0510e20a --- /dev/null +++ b/graph/incidents_graphml/2/29427560-7d24-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.35 + 100.64.39.35 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699330476 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 29427560-7d24-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/2/2948b480-654a-11ee-a13a-239f8a76841b.graphml b/graph/incidents_graphml/2/2948b480-654a-11ee-a13a-239f8a76841b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54c81d0f79b74cc29e31505dbd27941a92ac281e --- /dev/null +++ b/graph/incidents_graphml/2/2948b480-654a-11ee-a13a-239f8a76841b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.143 + 100.64.44.143 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696707969 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2948b480-654a-11ee-a13a-239f8a76841b + + + diff --git a/graph/incidents_graphml/2/29519090-7d24-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/2/29519090-7d24-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5589711c626cf2cfc023e3e7c23b2da8544bcd13 --- /dev/null +++ b/graph/incidents_graphml/2/29519090-7d24-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.35 + 100.64.39.35 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699330476 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 29519090-7d24-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/2/2956b240-eb63-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/2/2956b240-eb63-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1638ac51e3f1db1dbeac2bd72d0a99a5c625f45c --- /dev/null +++ b/graph/incidents_graphml/2/2956b240-eb63-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.59 + 100.64.73.59 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.237 + 100.64.81.237 + ["Exploiting Host"] + 0.83125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655157166 + malicious + 0.83125 + 0.83125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2956b240-eb63-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/2/295993f0-085a-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/2/295993f0-085a-11ef-81c9-bbab78bb4e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e871a6fe4c4445bc6358148586c7d647391ffde8 --- /dev/null +++ b/graph/incidents_graphml/2/295993f0-085a-11ef-81c9-bbab78bb4e36.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.17.98.67 + 172.17.98.67 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.87.78 + 100.64.87.78 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1714636880 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 295993f0-085a-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636880 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 295993f0-085a-11ef-81c9-bbab78bb4e36 + + + diff --git a/graph/incidents_graphml/2/29599f50-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/2/29599f50-0a43-11ee-bdb0-15a1612d17d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13603dbe375224585fa7326a4cf244b05e2a87a9 --- /dev/null +++ b/graph/incidents_graphml/2/29599f50-0a43-11ee-bdb0-15a1612d17d2.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.55 + 100.64.30.55 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.61 + 100.64.12.61 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.239 + 100.64.28.239 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.56 + 100.64.30.56 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.45 + 100.64.23.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.57 + 100.64.30.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.1 + 100.64.18.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + INCIDENT_LINK + 1686699406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29599f50-0a43-11ee-bdb0-15a1612d17d2 + + + diff --git a/graph/incidents_graphml/2/295b0400-654a-11ee-a13a-239f8a76841b.graphml b/graph/incidents_graphml/2/295b0400-654a-11ee-a13a-239f8a76841b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6eaf606a773cb5c27b60f7475d7f649b31171403 --- /dev/null +++ b/graph/incidents_graphml/2/295b0400-654a-11ee-a13a-239f8a76841b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.143 + 100.64.44.143 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696707969 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 295b0400-654a-11ee-a13a-239f8a76841b + + + diff --git a/graph/incidents_graphml/2/29682e30-533c-11ed-82ec-e7a72760a0c9.graphml b/graph/incidents_graphml/2/29682e30-533c-11ed-82ec-e7a72760a0c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d586b2e2dd2c32b7e5413ee523f5898dfdde13e4 --- /dev/null +++ b/graph/incidents_graphml/2/29682e30-533c-11ed-82ec-e7a72760a0c9.graphml @@ -0,0 +1,357 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.23 + 100.64.95.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.24 + 100.64.95.24 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.202 + 100.64.10.202 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.25 + 100.64.95.25 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.108 + 100.64.24.108 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.26 + 100.64.95.26 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.27 + 100.64.95.27 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.28 + 100.64.95.28 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + INCIDENT_LINK + 1666575337 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29682e30-533c-11ed-82ec-e7a72760a0c9 + + + diff --git a/graph/incidents_graphml/2/296b3e70-696d-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/2/296b3e70-696d-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c388b6b4f332c134cc555a7805fa53d16a441a3 --- /dev/null +++ b/graph/incidents_graphml/2/296b3e70-696d-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.220 + 100.64.67.220 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697162806 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 296b3e70-696d-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/2/296fc7d0-1f6a-11ee-86d7-9d80e15c5f0c.graphml b/graph/incidents_graphml/2/296fc7d0-1f6a-11ee-86d7-9d80e15c5f0c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c589e393745b281851d63e4fca54aba27a5d6a5 --- /dev/null +++ b/graph/incidents_graphml/2/296fc7d0-1f6a-11ee-86d7-9d80e15c5f0c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.2 + 100.64.18.2 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1689025131 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 296fc7d0-1f6a-11ee-86d7-9d80e15c5f0c + + + diff --git a/graph/incidents_graphml/2/29709490-718f-11ee-9fe3-bf96143a208f.graphml b/graph/incidents_graphml/2/29709490-718f-11ee-9fe3-bf96143a208f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc6a21c0849569b0884a3ab95b6988034ec1ee2f --- /dev/null +++ b/graph/incidents_graphml/2/29709490-718f-11ee-9fe3-bf96143a208f.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.109 + 100.64.68.109 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.110 + 100.64.68.110 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1698057018 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29709490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057018 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29709490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057018 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29709490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057018 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29709490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057018 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29709490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057018 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29709490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057018 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29709490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057018 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29709490-718f-11ee-9fe3-bf96143a208f + + + diff --git a/graph/incidents_graphml/2/297876a0-ee7c-11ee-8c82-b10f259979aa.graphml b/graph/incidents_graphml/2/297876a0-ee7c-11ee-8c82-b10f259979aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c00a5d4a51f68eef4922bfe7e44c7024659c0a67 --- /dev/null +++ b/graph/incidents_graphml/2/297876a0-ee7c-11ee-8c82-b10f259979aa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.169 + 100.64.26.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711792753 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 297876a0-ee7c-11ee-8c82-b10f259979aa + + + diff --git a/graph/incidents_graphml/2/2980c270-f24a-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/2/2980c270-f24a-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b896f3ac6c67b59020ab4e07852b419396c5d07f --- /dev/null +++ b/graph/incidents_graphml/2/2980c270-f24a-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.149 + 100.64.45.149 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712211083 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2980c270-f24a-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/2/298d5e30-ee7c-11ee-8c82-b10f259979aa.graphml b/graph/incidents_graphml/2/298d5e30-ee7c-11ee-8c82-b10f259979aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5dcdc8ed3af902179755cd7447fd3f6ad64f4b26 --- /dev/null +++ b/graph/incidents_graphml/2/298d5e30-ee7c-11ee-8c82-b10f259979aa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.169 + 100.64.26.169 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711792753 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 298d5e30-ee7c-11ee-8c82-b10f259979aa + + + diff --git a/graph/incidents_graphml/2/2990fc20-eb63-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/2/2990fc20-eb63-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cc635f44677e1cc11771211d938bbd5fcca1373 --- /dev/null +++ b/graph/incidents_graphml/2/2990fc20-eb63-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.238 + 100.64.81.238 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.178 + 100.64.72.178 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655157167 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2990fc20-eb63-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/2/2991bc90-4e6e-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/2/2991bc90-4e6e-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0537a577173fb6b7a2f4bf0be6d815ad96aca38 --- /dev/null +++ b/graph/incidents_graphml/2/2991bc90-4e6e-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.64 + 100.64.4.64 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694194554 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2991bc90-4e6e-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/2/29986920-f24a-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/2/29986920-f24a-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4568aea31a685dbe58381afee444836e8894f8ea --- /dev/null +++ b/graph/incidents_graphml/2/29986920-f24a-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.149 + 100.64.45.149 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712211083 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 29986920-f24a-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/2/29aa9190-f24a-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/2/29aa9190-f24a-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2e8ed7bdb851dc5a484e482a64977c0b3331d3b --- /dev/null +++ b/graph/incidents_graphml/2/29aa9190-f24a-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.151 + 100.64.45.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712211083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29aa9190-f24a-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/2/29afe890-696d-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/2/29afe890-696d-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ff97ddc0cfe99b12797fcfcd982797cba927ddb --- /dev/null +++ b/graph/incidents_graphml/2/29afe890-696d-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.222 + 100.64.67.222 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697162806 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29afe890-696d-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/2/29b0c470-57bd-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/2/29b0c470-57bd-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92d3062cc5bf955dbedfdfd2fa12ed7f4f5b39e2 --- /dev/null +++ b/graph/incidents_graphml/2/29b0c470-57bd-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,1127 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.121 + 100.64.11.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.229 + 100.64.4.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.122 + 100.64.11.122 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.124 + 100.64.11.124 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.125 + 100.64.11.125 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.60 + 100.64.8.60 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.126 + 100.64.11.126 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.127 + 100.64.11.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.128 + 100.64.11.128 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.229 + 100.64.7.229 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.129 + 100.64.11.129 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.130 + 100.64.11.130 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.131 + 100.64.11.131 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.132 + 100.64.11.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29b0c470-57bd-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/2/29bc46d0-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/2/29bc46d0-0c5d-11ed-b597-112eae6df069.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5267d805477ac4310913cba6ef8c5d2648d0f7d --- /dev/null +++ b/graph/incidents_graphml/2/29bc46d0-0c5d-11ed-b597-112eae6df069.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.118 + 100.64.78.118 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.170 + USER-0015-1679.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658782979 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29bc46d0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658782979 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29bc46d0-0c5d-11ed-b597-112eae6df069 + + + diff --git a/graph/incidents_graphml/2/29bdc780-3826-11ee-b5a7-eb9164a8ca63.graphml b/graph/incidents_graphml/2/29bdc780-3826-11ee-b5a7-eb9164a8ca63.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64538f7168b41b5edfe68509c7f7d1949d704700 --- /dev/null +++ b/graph/incidents_graphml/2/29bdc780-3826-11ee-b5a7-eb9164a8ca63.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.239 + 100.64.45.239 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1691744705 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29bdc780-3826-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744705 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29bdc780-3826-11ee-b5a7-eb9164a8ca63 + + + diff --git a/graph/incidents_graphml/2/29be67b0-f24a-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/2/29be67b0-f24a-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..623837dd6f08221404f8cf339060e1da0f5cfd31 --- /dev/null +++ b/graph/incidents_graphml/2/29be67b0-f24a-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.151 + 100.64.45.151 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712211083 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 29be67b0-f24a-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/2/29bef430-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/29bef430-5afd-11ee-8fa0-3f2281e2f9df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77fb0efba7a7a96898b9f6bc4b9506e81ccc0156 --- /dev/null +++ b/graph/incidents_graphml/2/29bef430-5afd-11ee-8fa0-3f2281e2f9df.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.139 + 100.64.16.139 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695575386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29bef430-5afd-11ee-8fa0-3f2281e2f9df + + + diff --git a/graph/incidents_graphml/2/29c4c1a0-57bd-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/2/29c4c1a0-57bd-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc8f3d8ac296e9697f3cc60effc53b717ab62494 --- /dev/null +++ b/graph/incidents_graphml/2/29c4c1a0-57bd-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,1293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.149 + 100.64.11.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.235 + 100.64.7.235 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.150 + 100.64.11.150 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.151 + 100.64.11.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.132 + 100.64.11.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.153 + 100.64.11.153 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.155 + 100.64.11.155 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.156 + 100.64.11.156 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.157 + 100.64.11.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.158 + 100.64.11.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29c4c1a0-57bd-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/2/29cad710-3b6c-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/2/29cad710-3b6c-11ee-a7d4-a597d065c4ef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a1b0ea48d617e6f9b25522a6f3102d29c03b7c9 --- /dev/null +++ b/graph/incidents_graphml/2/29cad710-3b6c-11ee-a7d4-a597d065c4ef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.241 + 100.64.24.241 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692104624 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29cad710-3b6c-11ee-a7d4-a597d065c4ef + + + diff --git a/graph/incidents_graphml/2/29d07d90-1476-11ee-877c-f76402fda8f6.graphml b/graph/incidents_graphml/2/29d07d90-1476-11ee-877c-f76402fda8f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7913ada51d0888302c0a3416dc248c7c694d255d --- /dev/null +++ b/graph/incidents_graphml/2/29d07d90-1476-11ee-877c-f76402fda8f6.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.65 + 100.64.48.65 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.66 + 100.64.48.66 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.67 + 100.64.48.67 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.68 + 100.64.48.68 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.69 + 100.64.48.69 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687820823 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29d07d90-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820823 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29d07d90-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820823 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29d07d90-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820823 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29d07d90-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820823 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29d07d90-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820823 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29d07d90-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820823 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29d07d90-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820823 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29d07d90-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820823 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29d07d90-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820823 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29d07d90-1476-11ee-877c-f76402fda8f6 + + + diff --git a/graph/incidents_graphml/2/29d09020-f24a-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/2/29d09020-f24a-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98bec12c10671fab3b858f0ab6d042176ec0ff7a --- /dev/null +++ b/graph/incidents_graphml/2/29d09020-f24a-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.153 + USER-0015-1351.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712211083 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29d09020-f24a-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/2/29d64cc0-5afd-11ee-8fa0-3f2281e2f9df.graphml b/graph/incidents_graphml/2/29d64cc0-5afd-11ee-8fa0-3f2281e2f9df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bef6ed391e9d87fbb113fe4ce071311a91eaed27 --- /dev/null +++ b/graph/incidents_graphml/2/29d64cc0-5afd-11ee-8fa0-3f2281e2f9df.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.139 + 100.64.16.139 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695575387 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 29d64cc0-5afd-11ee-8fa0-3f2281e2f9df + + + diff --git a/graph/incidents_graphml/2/29e16980-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/29e16980-4cc9-11ee-ba64-e11deb1801e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..577b0432fed950dcf28326b30291511517c4996e --- /dev/null +++ b/graph/incidents_graphml/2/29e16980-4cc9-11ee-ba64-e11deb1801e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.51 + 100.64.4.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694013737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e16980-4cc9-11ee-ba64-e11deb1801e6 + + + diff --git a/graph/incidents_graphml/2/29e25bc0-57bd-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/2/29e25bc0-57bd-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70d1a019050bced989de82510cf939e19373c596 --- /dev/null +++ b/graph/incidents_graphml/2/29e25bc0-57bd-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,915 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.170 + 100.64.11.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.60 + 100.64.8.60 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.171 + 100.64.11.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.202 + 100.64.6.202 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.172 + 100.64.11.172 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.78 + 100.64.8.78 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.173 + 100.64.11.173 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.174 + 100.64.11.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.175 + 100.64.11.175 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.176 + 100.64.11.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.177 + 100.64.11.177 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.178 + 100.64.11.178 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.179 + 100.64.11.179 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.180 + 100.64.11.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29e25bc0-57bd-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/2/29e4db70-f24a-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/2/29e4db70-f24a-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d1622af788c759ec93b916f9c4e498280013fa0 --- /dev/null +++ b/graph/incidents_graphml/2/29e4db70-f24a-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.153 + USER-0015-1351.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712211084 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 29e4db70-f24a-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/2/29eb1170-fe30-11ed-b9d7-d503d3f2ee6a.graphml b/graph/incidents_graphml/2/29eb1170-fe30-11ed-b9d7-d503d3f2ee6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..361268012615d6ca3e1b0a5f7c76d915bd47135b --- /dev/null +++ b/graph/incidents_graphml/2/29eb1170-fe30-11ed-b9d7-d503d3f2ee6a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.106 + 100.64.34.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685371833 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29eb1170-fe30-11ed-b9d7-d503d3f2ee6a + + + diff --git a/graph/incidents_graphml/2/29f6dcd0-f24a-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/2/29f6dcd0-f24a-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b91de42d850fd491a1a5d4744e5f5ee6b2aa463 --- /dev/null +++ b/graph/incidents_graphml/2/29f6dcd0-f24a-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.155 + 100.64.45.155 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712211084 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 29f6dcd0-f24a-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/2/29f6ed50-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/29f6ed50-4cc9-11ee-ba64-e11deb1801e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c709a32e8e3699aeacc9ce45897d57cf74ca1fc --- /dev/null +++ b/graph/incidents_graphml/2/29f6ed50-4cc9-11ee-ba64-e11deb1801e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.51 + 100.64.4.51 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694013737 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 29f6ed50-4cc9-11ee-ba64-e11deb1801e6 + + + diff --git a/graph/incidents_graphml/2/29ffeff0-12df-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/2/29ffeff0-12df-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ead5e8b14e5d9f0220f12b072428b6ecac16e0db --- /dev/null +++ b/graph/incidents_graphml/2/29ffeff0-12df-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.121 + 100.64.81.121 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.51 + 100.64.73.51 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.62.25 + 100.64.62.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.28.1 + 100.64.28.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687646018 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29ffeff0-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646018 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29ffeff0-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646018 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29ffeff0-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646018 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29ffeff0-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646018 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29ffeff0-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646018 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 29ffeff0-12df-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/2/2a077670-1ba5-11ee-8306-735a9f6c811f.graphml b/graph/incidents_graphml/2/2a077670-1ba5-11ee-8306-735a9f6c811f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ced773e80bb4111fe5fdb8ed15fa6236de41419 --- /dev/null +++ b/graph/incidents_graphml/2/2a077670-1ba5-11ee-8306-735a9f6c811f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.251 + 100.64.18.251 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688610668 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a077670-1ba5-11ee-8306-735a9f6c811f + + + diff --git a/graph/incidents_graphml/2/2a0a9c60-4cc9-11ee-ba64-e11deb1801e6.graphml b/graph/incidents_graphml/2/2a0a9c60-4cc9-11ee-ba64-e11deb1801e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d97a61155ede15f74a13bb32b08839732b4ab22 --- /dev/null +++ b/graph/incidents_graphml/2/2a0a9c60-4cc9-11ee-ba64-e11deb1801e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.165 + 100.64.36.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694013737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a0a9c60-4cc9-11ee-ba64-e11deb1801e6 + + + diff --git a/graph/incidents_graphml/2/2a0b2820-f24a-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/2/2a0b2820-f24a-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8fd2d103feaf139b68a1e16df7ac990ace85aae0 --- /dev/null +++ b/graph/incidents_graphml/2/2a0b2820-f24a-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.155 + 100.64.45.155 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712211084 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2a0b2820-f24a-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/2/2a0c2e00-fe30-11ed-b9d7-d503d3f2ee6a.graphml b/graph/incidents_graphml/2/2a0c2e00-fe30-11ed-b9d7-d503d3f2ee6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46bc84f4b27119af35f2e6231b3d973a0b01dc53 --- /dev/null +++ b/graph/incidents_graphml/2/2a0c2e00-fe30-11ed-b9d7-d503d3f2ee6a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.34.106 + 100.64.34.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685371833 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2a0c2e00-fe30-11ed-b9d7-d503d3f2ee6a + + + diff --git a/graph/incidents_graphml/2/2a182d80-eb63-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/2/2a182d80-eb63-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f672668c96f8abdeee6824c8749d8c59abddce9 --- /dev/null +++ b/graph/incidents_graphml/2/2a182d80-eb63-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.81.239 + USER-0015-1908.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655157168 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2a182d80-eb63-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/2/2a204930-12df-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/2/2a204930-12df-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4257039170164d9913f575e0e291f8e700b198a3 --- /dev/null +++ b/graph/incidents_graphml/2/2a204930-12df-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.34 + 100.64.14.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.122 + 100.64.81.122 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.81.123 + 100.64.81.123 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687646019 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2a204930-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646019 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2a204930-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646019 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2a204930-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646019 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2a204930-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646019 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2a204930-12df-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687646019 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2a204930-12df-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/2/2a2aba90-6f7a-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/2/2a2aba90-6f7a-11ed-88c8-935f200141c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43e7b38795732279d0a4872a107b047cdab4798b --- /dev/null +++ b/graph/incidents_graphml/2/2a2aba90-6f7a-11ed-88c8-935f200141c8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.80 + 100.64.77.80 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.70.250 + 100.64.70.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1669680600 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2a2aba90-6f7a-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669680600 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2a2aba90-6f7a-11ed-88c8-935f200141c8 + + + diff --git a/graph/incidents_graphml/2/2a31dc00-654a-11ee-a13a-239f8a76841b.graphml b/graph/incidents_graphml/2/2a31dc00-654a-11ee-a13a-239f8a76841b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9526b100f7965e38cff6ca849a37ecbfe3de7f1b --- /dev/null +++ b/graph/incidents_graphml/2/2a31dc00-654a-11ee-a13a-239f8a76841b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.90 + 100.64.51.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696707970 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2a31dc00-654a-11ee-a13a-239f8a76841b + + + diff --git a/graph/incidents_graphml/2/2a5d73e0-eb63-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/2/2a5d73e0-eb63-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f50a0ecd5aeb75ee2a96dbd14602d04e65d0ed4 --- /dev/null +++ b/graph/incidents_graphml/2/2a5d73e0-eb63-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.81.241 + USER-0015-1909.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655157168 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2a5d73e0-eb63-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/2/2a826c90-ee7c-11ee-8c82-b10f259979aa.graphml b/graph/incidents_graphml/2/2a826c90-ee7c-11ee-8c82-b10f259979aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1a769f36c13866dbfbdbb84d121724d334b99d9 --- /dev/null +++ b/graph/incidents_graphml/2/2a826c90-ee7c-11ee-8c82-b10f259979aa.graphml @@ -0,0 +1,691 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.171 + 100.64.26.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.245 + 100.64.12.245 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.172 + 100.64.26.172 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.173 + 100.64.26.173 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.174 + 100.64.26.174 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.175 + 100.64.26.175 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.103 + 100.64.18.103 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.176 + 100.64.26.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.177 + 100.64.26.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.178 + 100.64.26.178 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.20.255 + 100.64.20.255 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.179 + 100.64.21.179 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.179 + 100.64.26.179 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.73 + 100.64.19.73 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.180 + 100.64.26.180 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.220 + 100.64.3.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.101 + 100.64.15.101 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.181 + 100.64.26.181 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2a826c90-ee7c-11ee-8c82-b10f259979aa + + + diff --git a/graph/incidents_graphml/2/2a91de10-9183-11ee-afab-0bead911b18a.graphml b/graph/incidents_graphml/2/2a91de10-9183-11ee-afab-0bead911b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0aa7ea4f49ff1183dae859f6c6a0d95731c25fb --- /dev/null +++ b/graph/incidents_graphml/2/2a91de10-9183-11ee-afab-0bead911b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.16 + 100.64.49.16 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701570303 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2a91de10-9183-11ee-afab-0bead911b18a + + + diff --git a/graph/incidents_graphml/2/2aa006b0-ee7c-11ee-8c82-b10f259979aa.graphml b/graph/incidents_graphml/2/2aa006b0-ee7c-11ee-8c82-b10f259979aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05ea7c73026f68c6a7dd1ed729160dcfa0090aa8 --- /dev/null +++ b/graph/incidents_graphml/2/2aa006b0-ee7c-11ee-8c82-b10f259979aa.graphml @@ -0,0 +1,647 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.171 + 100.64.26.171 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.193 + 100.64.26.193 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.194 + 100.64.26.194 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.152 + 100.64.14.152 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.195 + 100.64.26.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.196 + 100.64.26.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.197 + 100.64.26.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.198 + 100.64.26.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.199 + 100.64.26.199 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.200 + 100.64.26.200 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.201 + 100.64.26.201 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.202 + 100.64.26.202 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.167 + 100.64.24.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.203 + 100.64.26.203 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.204 + 100.64.26.204 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + INCIDENT_LINK + 1711792755 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aa006b0-ee7c-11ee-8c82-b10f259979aa + + + diff --git a/graph/incidents_graphml/2/2ab48e90-80eb-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/2/2ab48e90-80eb-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f20889f3756809ad246e062e0f2930159b0a4b81 --- /dev/null +++ b/graph/incidents_graphml/2/2ab48e90-80eb-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.117 + 100.64.45.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699745801 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2ab48e90-80eb-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/2/2aba1ec0-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/2/2aba1ec0-0948-11ee-899e-3d5be197ab3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53b8f58e8cb144d44c1cd9cba729ffcd3b56aec0 --- /dev/null +++ b/graph/incidents_graphml/2/2aba1ec0-0948-11ee-899e-3d5be197ab3b.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.93.185 + 192.168.93.185 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Umbrella","Meraki"] + + + HOST + 100.64.79.146 + 100.64.79.146 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 192.168.96.51 + 192.168.96.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.147 + 100.64.79.147 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686591605 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aba1ec0-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591605 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aba1ec0-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591605 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aba1ec0-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591605 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aba1ec0-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591605 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aba1ec0-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591605 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aba1ec0-0948-11ee-899e-3d5be197ab3b + + + diff --git a/graph/incidents_graphml/2/2ac1d500-80eb-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/2/2ac1d500-80eb-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0a1ae909b7f86436c561a5a405c6d93830c3f27 --- /dev/null +++ b/graph/incidents_graphml/2/2ac1d500-80eb-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.119 + 100.64.45.119 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699745801 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ac1d500-80eb-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/2/2ac6c890-ee7c-11ee-8c82-b10f259979aa.graphml b/graph/incidents_graphml/2/2ac6c890-ee7c-11ee-8c82-b10f259979aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9eb4081d826caf259b5c37133c7f7ba168e1c27 --- /dev/null +++ b/graph/incidents_graphml/2/2ac6c890-ee7c-11ee-8c82-b10f259979aa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.221 + 100.64.26.221 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711792755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ac6c890-ee7c-11ee-8c82-b10f259979aa + + + diff --git a/graph/incidents_graphml/2/2ac71c80-4388-11ef-ada3-4f706d22771d.graphml b/graph/incidents_graphml/2/2ac71c80-4388-11ef-ada3-4f706d22771d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..73316f59734ec8e584700578ac161d1d622eb4af --- /dev/null +++ b/graph/incidents_graphml/2/2ac71c80-4388-11ef-ada3-4f706d22771d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.47 + 100.64.7.47 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1721143758 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2ac71c80-4388-11ef-ada3-4f706d22771d + + + diff --git a/graph/incidents_graphml/2/2accbc60-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/2/2accbc60-0948-11ee-899e-3d5be197ab3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9cc351fd27463505f53c8aafdcf6be020f545029 --- /dev/null +++ b/graph/incidents_graphml/2/2accbc60-0948-11ee-899e-3d5be197ab3b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.74 + 100.64.18.74 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.172 + USER-0015-1814.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686591605 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2accbc60-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591605 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2accbc60-0948-11ee-899e-3d5be197ab3b + + + diff --git a/graph/incidents_graphml/2/2ad02ce0-80eb-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/2/2ad02ce0-80eb-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fa30e49b2fc080a1028882fe8e54965b0b4c54e --- /dev/null +++ b/graph/incidents_graphml/2/2ad02ce0-80eb-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.119 + 100.64.45.119 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699745801 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2ad02ce0-80eb-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/2/2adc25b0-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/2/2adc25b0-0948-11ee-899e-3d5be197ab3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..880cc60fc10bc1e7dc776c497c0ea9932e58a12f --- /dev/null +++ b/graph/incidents_graphml/2/2adc25b0-0948-11ee-899e-3d5be197ab3b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.34 + 100.64.7.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.41 + 100.64.76.41 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686591605 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2adc25b0-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591605 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2adc25b0-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591605 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2adc25b0-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591605 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2adc25b0-0948-11ee-899e-3d5be197ab3b + + + diff --git a/graph/incidents_graphml/2/2ade0420-a8ee-11ee-8c6a-79d6a27183d0.graphml b/graph/incidents_graphml/2/2ade0420-a8ee-11ee-8c6a-79d6a27183d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d690f48fb06861dfaea02c96462712bf3e026286 --- /dev/null +++ b/graph/incidents_graphml/2/2ade0420-a8ee-11ee-8c6a-79d6a27183d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.228 + 100.64.7.228 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704145137 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ade0420-a8ee-11ee-8c6a-79d6a27183d0 + + + diff --git a/graph/incidents_graphml/2/2adef9f0-80eb-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/2/2adef9f0-80eb-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57d0f30954a6694e2b88d4aa68fa0d98a53965a7 --- /dev/null +++ b/graph/incidents_graphml/2/2adef9f0-80eb-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.121 + 100.64.45.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699745802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2adef9f0-80eb-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/2/2adf0b80-ee7c-11ee-8c82-b10f259979aa.graphml b/graph/incidents_graphml/2/2adf0b80-ee7c-11ee-8c82-b10f259979aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3b50fbb8d34f1950b1dbf2695d0fc4bdf00a8d8 --- /dev/null +++ b/graph/incidents_graphml/2/2adf0b80-ee7c-11ee-8c82-b10f259979aa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.221 + 100.64.26.221 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711792755 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2adf0b80-ee7c-11ee-8c82-b10f259979aa + + + diff --git a/graph/incidents_graphml/2/2ae1f780-4388-11ef-ada3-4f706d22771d.graphml b/graph/incidents_graphml/2/2ae1f780-4388-11ef-ada3-4f706d22771d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc3e7cb6effee390a668d8df46c457e00f6ab9cb --- /dev/null +++ b/graph/incidents_graphml/2/2ae1f780-4388-11ef-ada3-4f706d22771d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.7.47 + 100.64.7.47 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721143758 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2ae1f780-4388-11ef-ada3-4f706d22771d + + + diff --git a/graph/incidents_graphml/2/2ae4bec0-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/2ae4bec0-01d5-11ee-8c41-374f8f3a6a1c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72ac7db7306382ec53dc584088ed41c13e9b86b5 --- /dev/null +++ b/graph/incidents_graphml/2/2ae4bec0-01d5-11ee-8c41-374f8f3a6a1c.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.220 + 100.64.23.220 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.72.173 + 100.64.72.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.72.174 + 100.64.72.174 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685772555 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ae4bec0-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772555 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ae4bec0-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772555 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ae4bec0-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772555 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ae4bec0-01d5-11ee-8c41-374f8f3a6a1c + + + diff --git a/graph/incidents_graphml/2/2aecd130-a8ee-11ee-8c6a-79d6a27183d0.graphml b/graph/incidents_graphml/2/2aecd130-a8ee-11ee-8c6a-79d6a27183d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d45b33797c82657afdffa6b049310f67bbee4b41 --- /dev/null +++ b/graph/incidents_graphml/2/2aecd130-a8ee-11ee-8c6a-79d6a27183d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.228 + 100.64.7.228 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704145137 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aecd130-a8ee-11ee-8c6a-79d6a27183d0 + + + diff --git a/graph/incidents_graphml/2/2aed73c0-5447-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/2/2aed73c0-5447-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5722e5231482994379b5dbe4005311c9cc5b696b --- /dev/null +++ b/graph/incidents_graphml/2/2aed73c0-5447-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.134 + 100.64.14.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694837513 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aed73c0-5447-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/2/2aedee10-80eb-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/2/2aedee10-80eb-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13fb89f430b16b05cc9ab069f61cc1a7f4a4a72c --- /dev/null +++ b/graph/incidents_graphml/2/2aedee10-80eb-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.121 + 100.64.45.121 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699745802 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2aedee10-80eb-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/2/2af9fa30-299b-11ef-bcba-e72095bb0d10.graphml b/graph/incidents_graphml/2/2af9fa30-299b-11ef-bcba-e72095bb0d10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a294f468045f56b5822d63455ff5858ccdbb2fad --- /dev/null +++ b/graph/incidents_graphml/2/2af9fa30-299b-11ef-bcba-e72095bb0d10.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.42 + 100.64.60.42 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.3 + 100.64.24.3 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.43 + 100.64.60.43 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718293189 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2af9fa30-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293189 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2af9fa30-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293189 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2af9fa30-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293189 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2af9fa30-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293189 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2af9fa30-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293189 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2af9fa30-299b-11ef-bcba-e72095bb0d10 + + + diff --git a/graph/incidents_graphml/2/2afc1ee0-80eb-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/2/2afc1ee0-80eb-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..97a6948901db4561b537aedb0ef5197cf4f6e017 --- /dev/null +++ b/graph/incidents_graphml/2/2afc1ee0-80eb-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.123 + 100.64.45.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699745802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2afc1ee0-80eb-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/2/2b00ab30-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/2b00ab30-01d5-11ee-8c41-374f8f3a6a1c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9cf3686318d037450cca2b0dbe59411de637526 --- /dev/null +++ b/graph/incidents_graphml/2/2b00ab30-01d5-11ee-8c41-374f8f3a6a1c.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.175 + 100.64.72.175 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.176 + 100.64.72.176 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.72.177 + 100.64.72.177 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.29.39 + 100.64.29.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685772555 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b00ab30-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772555 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b00ab30-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772555 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b00ab30-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772555 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b00ab30-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772555 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b00ab30-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772555 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b00ab30-01d5-11ee-8c41-374f8f3a6a1c + + + diff --git a/graph/incidents_graphml/2/2b0dab10-7c09-11ee-8a78-ffddbc4b96f0.graphml b/graph/incidents_graphml/2/2b0dab10-7c09-11ee-8a78-ffddbc4b96f0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..483a6390fda8ce0c09d94bb8a2778ecceb804c89 --- /dev/null +++ b/graph/incidents_graphml/2/2b0dab10-7c09-11ee-8a78-ffddbc4b96f0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.147 + 100.64.38.147 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699208931 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2b0dab10-7c09-11ee-8a78-ffddbc4b96f0 + + + diff --git a/graph/incidents_graphml/2/2b123ef0-80eb-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/2/2b123ef0-80eb-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e0c024a28debad96fdd8910d7cda616b3312d18 --- /dev/null +++ b/graph/incidents_graphml/2/2b123ef0-80eb-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.123 + 100.64.45.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699745802 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b123ef0-80eb-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/2/2b158540-654a-11ee-a13a-239f8a76841b.graphml b/graph/incidents_graphml/2/2b158540-654a-11ee-a13a-239f8a76841b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d69cc96bec8fc6782b32b035e660194c5dd41ff1 --- /dev/null +++ b/graph/incidents_graphml/2/2b158540-654a-11ee-a13a-239f8a76841b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.69 + 100.64.23.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696707972 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2b158540-654a-11ee-a13a-239f8a76841b + + + diff --git a/graph/incidents_graphml/2/2b1f3740-80eb-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/2/2b1f3740-80eb-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7b01586c898c9c494ecdfb509e88d1d90e26041 --- /dev/null +++ b/graph/incidents_graphml/2/2b1f3740-80eb-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.216 + 100.64.14.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699745802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b1f3740-80eb-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/2/2b208ba0-aac0-11ee-a834-01ba9434432f.graphml b/graph/incidents_graphml/2/2b208ba0-aac0-11ee-a834-01ba9434432f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c48b569df7d54f6035c0941dd734e2e725fd774 --- /dev/null +++ b/graph/incidents_graphml/2/2b208ba0-aac0-11ee-a834-01ba9434432f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.188 + 100.64.24.188 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704345283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b208ba0-aac0-11ee-a834-01ba9434432f + + + diff --git a/graph/incidents_graphml/2/2b21e500-dbb1-11ee-a665-15e5a5884e11.graphml b/graph/incidents_graphml/2/2b21e500-dbb1-11ee-a665-15e5a5884e11.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7190e6f745a75d67557f4c3b5785a24ad6d2fa1e --- /dev/null +++ b/graph/incidents_graphml/2/2b21e500-dbb1-11ee-a665-15e5a5884e11.graphml @@ -0,0 +1,755 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.171 + 100.64.50.171 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.172 + 100.64.50.172 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.173 + 100.64.50.173 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.89 + 100.64.46.89 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.174 + 100.64.50.174 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.76 + 100.64.15.76 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.22 + 100.64.21.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.175 + 100.64.50.175 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.176 + 100.64.50.176 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.212 + 100.64.9.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.48 + 100.64.30.48 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.177 + USER-0015-1390.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.178 + 100.64.50.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.179 + 100.64.50.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.180 + 100.64.50.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.181 + 100.64.50.181 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726447 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b21e500-dbb1-11ee-a665-15e5a5884e11 + + + diff --git a/graph/incidents_graphml/2/2b27d730-7d24-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/2/2b27d730-7d24-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cadcd04f4182687f4a190f9e5999752daa0add8 --- /dev/null +++ b/graph/incidents_graphml/2/2b27d730-7d24-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.37 + 100.64.39.37 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699330479 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b27d730-7d24-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/2/2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6.graphml b/graph/incidents_graphml/2/2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5e0d8bde91cb20d5a22713f0cec4c6bf3616606 --- /dev/null +++ b/graph/incidents_graphml/2/2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.23 + USER-0015-1667.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.60 + 100.64.73.60 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.24 + 100.64.74.24 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.25 + 100.64.74.25 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.26 + 100.64.74.26 + ["Exploiting Host"] + 0.7525 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656397127 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397127 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397127 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397127 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397127 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397127 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397127 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397127 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397127 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397127 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b2c9ce0-f6aa-11ec-86ed-01daccdabaa6 + + + diff --git a/graph/incidents_graphml/2/2b2d5300-654a-11ee-a13a-239f8a76841b.graphml b/graph/incidents_graphml/2/2b2d5300-654a-11ee-a13a-239f8a76841b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a67293eb09f6100059b44100cd2c0415d2e0d8f --- /dev/null +++ b/graph/incidents_graphml/2/2b2d5300-654a-11ee-a13a-239f8a76841b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.69 + 100.64.23.69 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696707972 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b2d5300-654a-11ee-a13a-239f8a76841b + + + diff --git a/graph/incidents_graphml/2/2b2ec7a0-80eb-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/2/2b2ec7a0-80eb-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2de9a434d273ec4fc0db2e8a8488ccfcae88e78 --- /dev/null +++ b/graph/incidents_graphml/2/2b2ec7a0-80eb-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.216 + 100.64.14.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699745802 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b2ec7a0-80eb-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/2/2b2f5a50-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/2/2b2f5a50-6393-11ee-a10b-9345395d0398.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2224bdd089976798ea5888a1ad730acba90360ac --- /dev/null +++ b/graph/incidents_graphml/2/2b2f5a50-6393-11ee-a10b-9345395d0398.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.182 + 100.64.36.182 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696519423 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b2f5a50-6393-11ee-a10b-9345395d0398 + + + diff --git a/graph/incidents_graphml/2/2b349cd0-eb1d-11ec-80a1-dd24f7271411.graphml b/graph/incidents_graphml/2/2b349cd0-eb1d-11ec-80a1-dd24f7271411.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6cf1fa65e1521cbf035b569552bb0dff208dbed4 --- /dev/null +++ b/graph/incidents_graphml/2/2b349cd0-eb1d-11ec-80a1-dd24f7271411.graphml @@ -0,0 +1,121 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.216 + 100.64.74.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.217 + 100.64.74.217 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.218 + USER-0015-1702.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.172 + 100.64.72.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655127105 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b349cd0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127105 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b349cd0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127105 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b349cd0-eb1d-11ec-80a1-dd24f7271411 + + + INCIDENT_LINK + 1655127105 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b349cd0-eb1d-11ec-80a1-dd24f7271411 + + + diff --git a/graph/incidents_graphml/2/2b3bb4c0-aac0-11ee-a834-01ba9434432f.graphml b/graph/incidents_graphml/2/2b3bb4c0-aac0-11ee-a834-01ba9434432f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd165e7de545a49322dec44689c2c79a9607d518 --- /dev/null +++ b/graph/incidents_graphml/2/2b3bb4c0-aac0-11ee-a834-01ba9434432f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.188 + 100.64.24.188 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704345283 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b3bb4c0-aac0-11ee-a834-01ba9434432f + + + diff --git a/graph/incidents_graphml/2/2b3e6950-57bd-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/2/2b3e6950-57bd-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c25f81d62aab703662f1ff887d0d0a1c7b166ca4 --- /dev/null +++ b/graph/incidents_graphml/2/2b3e6950-57bd-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.194 + 100.64.11.194 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.195 + 100.64.11.195 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695218048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b3e6950-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b3e6950-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b3e6950-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b3e6950-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b3e6950-57bd-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695218048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b3e6950-57bd-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/2/2b40bf70-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/2/2b40bf70-6393-11ee-a10b-9345395d0398.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9781043e86647d070b38ae290fba392451f5776 --- /dev/null +++ b/graph/incidents_graphml/2/2b40bf70-6393-11ee-a10b-9345395d0398.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.182 + 100.64.36.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696519423 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b40bf70-6393-11ee-a10b-9345395d0398 + + + diff --git a/graph/incidents_graphml/2/2b53b860-fc46-11ec-b1da-11e6c916d75e.graphml b/graph/incidents_graphml/2/2b53b860-fc46-11ec-b1da-11e6c916d75e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..090b738bc93cf6a34122ba699ab9d42f3d2e7813 --- /dev/null +++ b/graph/incidents_graphml/2/2b53b860-fc46-11ec-b1da-11e6c916d75e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.1.39 + USER-0015-1719.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.11.41 + 100.64.11.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657013884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b53b860-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b53b860-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b53b860-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b53b860-fc46-11ec-b1da-11e6c916d75e + + + diff --git a/graph/incidents_graphml/2/2b5adb90-5447-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/2/2b5adb90-5447-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..07ec355b1c5f0ab4cd6851f6e3597c472e7160a6 --- /dev/null +++ b/graph/incidents_graphml/2/2b5adb90-5447-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.105 + 100.64.7.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694837514 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b5adb90-5447-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/2/2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a.graphml b/graph/incidents_graphml/2/2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9b7bce3f4bac2e61d7cf3138ce915d2a9e127a8 --- /dev/null +++ b/graph/incidents_graphml/2/2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a.graphml @@ -0,0 +1,439 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.107 + 100.64.35.107 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.17.15 + 100.64.17.15 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.17.1 + 100.64.17.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.134 + 100.64.30.134 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.108 + 100.64.35.108 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.35.109 + 100.64.35.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.35.110 + 100.64.35.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.111 + 100.64.35.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.112 + 100.64.35.112 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371835 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5bdf80-fe30-11ed-b9d7-d503d3f2ee6a + + + diff --git a/graph/incidents_graphml/2/2b5d0730-fc46-11ec-b1da-11e6c916d75e.graphml b/graph/incidents_graphml/2/2b5d0730-fc46-11ec-b1da-11e6c916d75e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95b7ce5eb4b776d71bc08a70dfe9f294b2be0e7a --- /dev/null +++ b/graph/incidents_graphml/2/2b5d0730-fc46-11ec-b1da-11e6c916d75e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.9 + 100.64.83.9 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.130 + 100.64.72.130 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.30.118 + 100.64.30.118 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657013884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5d0730-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5d0730-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5d0730-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b5d0730-fc46-11ec-b1da-11e6c916d75e + + + diff --git a/graph/incidents_graphml/2/2b6a9300-5447-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/2/2b6a9300-5447-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56901ea5872d0906b4a6ee5e0c1f52fc3832977e --- /dev/null +++ b/graph/incidents_graphml/2/2b6a9300-5447-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.105 + 100.64.7.105 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694837514 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b6a9300-5447-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/2/2b6bdcb0-f421-11ec-8288-bdf5b9cb0b2b.graphml b/graph/incidents_graphml/2/2b6bdcb0-f421-11ec-8288-bdf5b9cb0b2b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a4661159a23f0b1ad957e247a15c52c74e74983 --- /dev/null +++ b/graph/incidents_graphml/2/2b6bdcb0-f421-11ec-8288-bdf5b9cb0b2b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.175 + 100.64.71.175 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656118384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b6bdcb0-f421-11ec-8288-bdf5b9cb0b2b + + + INCIDENT_LINK + 1656118384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b6bdcb0-f421-11ec-8288-bdf5b9cb0b2b + + + diff --git a/graph/incidents_graphml/2/2b75ab10-0a4f-11ee-8254-9ff4ea1b8ad7.graphml b/graph/incidents_graphml/2/2b75ab10-0a4f-11ee-8254-9ff4ea1b8ad7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99155e6f157e9bf1bbaf21e62cfedbb30fd7d7a0 --- /dev/null +++ b/graph/incidents_graphml/2/2b75ab10-0a4f-11ee-8254-9ff4ea1b8ad7.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.161 + 100.64.9.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.231 + 100.64.10.231 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.219 + 100.64.39.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686704564 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b75ab10-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704564 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b75ab10-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704564 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b75ab10-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704564 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b75ab10-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704564 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b75ab10-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704564 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b75ab10-0a4f-11ee-8254-9ff4ea1b8ad7 + + + diff --git a/graph/incidents_graphml/2/2b7a7180-5447-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/2/2b7a7180-5447-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5339c3ef51c2ab511cd4eb9fa3baa52318ea18df --- /dev/null +++ b/graph/incidents_graphml/2/2b7a7180-5447-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.136 + 100.64.14.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694837514 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b7a7180-5447-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/2/2b7b9c80-fe30-11ed-b9d7-d503d3f2ee6a.graphml b/graph/incidents_graphml/2/2b7b9c80-fe30-11ed-b9d7-d503d3f2ee6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a174ca5dab91cff7cd0303a8ed8c1e4e31caa803 --- /dev/null +++ b/graph/incidents_graphml/2/2b7b9c80-fe30-11ed-b9d7-d503d3f2ee6a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.35.107 + 100.64.35.107 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685371836 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b7b9c80-fe30-11ed-b9d7-d503d3f2ee6a + + + diff --git a/graph/incidents_graphml/2/2b7d3bc0-f0f7-11ee-9141-97f57fdeb7f9.graphml b/graph/incidents_graphml/2/2b7d3bc0-f0f7-11ee-9141-97f57fdeb7f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..771daa5c8329c839ce17589fc0e40dbf01410059 --- /dev/null +++ b/graph/incidents_graphml/2/2b7d3bc0-f0f7-11ee-9141-97f57fdeb7f9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.156 + 100.64.22.156 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect"] + + + INCIDENT_LINK + 1712065487 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b7d3bc0-f0f7-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712065487 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2b7d3bc0-f0f7-11ee-9141-97f57fdeb7f9 + + + diff --git a/graph/incidents_graphml/2/2b8826e0-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/2/2b8826e0-0761-11ef-b3ae-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea306f689b929be036c0e073f2ac8f0a7dca0d23 --- /dev/null +++ b/graph/incidents_graphml/2/2b8826e0-0761-11ef-b3ae-bbe9f432e5f6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.150 + 100.64.51.150 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714529939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b8826e0-0761-11ef-b3ae-bbe9f432e5f6 + + + INCIDENT_LINK + 1714529939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2b8826e0-0761-11ef-b3ae-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/2/2b8a9e20-5447-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/2/2b8a9e20-5447-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cd63a16688328599265f2ee775f5478282ba05e --- /dev/null +++ b/graph/incidents_graphml/2/2b8a9e20-5447-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.136 + 100.64.14.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694837514 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2b8a9e20-5447-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/2/2ba84040-69e8-11ee-abad-55192da42b01.graphml b/graph/incidents_graphml/2/2ba84040-69e8-11ee-abad-55192da42b01.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9129e133a16a1119c005c2e441d001e10d59cc4e --- /dev/null +++ b/graph/incidents_graphml/2/2ba84040-69e8-11ee-abad-55192da42b01.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.88 + 100.64.37.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697215638 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ba84040-69e8-11ee-abad-55192da42b01 + + + diff --git a/graph/incidents_graphml/2/2bb4ea70-69e8-11ee-abad-55192da42b01.graphml b/graph/incidents_graphml/2/2bb4ea70-69e8-11ee-abad-55192da42b01.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8568df978735d59df4cbc1075cbee15f6332bae4 --- /dev/null +++ b/graph/incidents_graphml/2/2bb4ea70-69e8-11ee-abad-55192da42b01.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.88 + 100.64.37.88 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697215638 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2bb4ea70-69e8-11ee-abad-55192da42b01 + + + diff --git a/graph/incidents_graphml/2/2be151a0-69e8-11ee-abad-55192da42b01.graphml b/graph/incidents_graphml/2/2be151a0-69e8-11ee-abad-55192da42b01.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de04e7d96f7866f420d8a68396c9fcf6ac8a2d0c --- /dev/null +++ b/graph/incidents_graphml/2/2be151a0-69e8-11ee-abad-55192da42b01.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.239 + 100.64.60.239 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697215638 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2be151a0-69e8-11ee-abad-55192da42b01 + + + diff --git a/graph/incidents_graphml/2/2be50a50-05a8-11ef-8a49-f14dcee941df.graphml b/graph/incidents_graphml/2/2be50a50-05a8-11ef-8a49-f14dcee941df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6292f31e824f4260d80e5a1276adf0a197f490c9 --- /dev/null +++ b/graph/incidents_graphml/2/2be50a50-05a8-11ef-8a49-f14dcee941df.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.88 + 100.64.92.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 100.64.24.182 + 100.64.24.182 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.92.89 + 100.64.92.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1714340532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2be50a50-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2be50a50-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2be50a50-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2be50a50-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2be50a50-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2be50a50-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2be50a50-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2be50a50-05a8-11ef-8a49-f14dcee941df + + + diff --git a/graph/incidents_graphml/2/2bf06cd0-69e8-11ee-abad-55192da42b01.graphml b/graph/incidents_graphml/2/2bf06cd0-69e8-11ee-abad-55192da42b01.graphml new file mode 100644 index 0000000000000000000000000000000000000000..547fb8faa4e229800e6deab2d471f5adefe384a9 --- /dev/null +++ b/graph/incidents_graphml/2/2bf06cd0-69e8-11ee-abad-55192da42b01.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.239 + 100.64.60.239 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697215638 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2bf06cd0-69e8-11ee-abad-55192da42b01 + + + diff --git a/graph/incidents_graphml/2/2bf0d3f0-aac0-11ee-a834-01ba9434432f.graphml b/graph/incidents_graphml/2/2bf0d3f0-aac0-11ee-a834-01ba9434432f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b3723d864f08d788917ba333c164f76845680fa --- /dev/null +++ b/graph/incidents_graphml/2/2bf0d3f0-aac0-11ee-a834-01ba9434432f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.246 + 100.64.15.246 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704345284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2bf0d3f0-aac0-11ee-a834-01ba9434432f + + + diff --git a/graph/incidents_graphml/2/2bfa30b0-1174-11ef-98dd-db867c05f09b.graphml b/graph/incidents_graphml/2/2bfa30b0-1174-11ef-98dd-db867c05f09b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60ef33f98b88fc30dcdd3adc7a152ccb048320c1 --- /dev/null +++ b/graph/incidents_graphml/2/2bfa30b0-1174-11ef-98dd-db867c05f09b.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.55 + USER-0015-2169.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.51.25 + 100.64.51.25 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.56 + 100.64.97.56 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715637612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2bfa30b0-1174-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2bfa30b0-1174-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2bfa30b0-1174-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2bfa30b0-1174-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2bfa30b0-1174-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637612 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2bfa30b0-1174-11ef-98dd-db867c05f09b + + + diff --git a/graph/incidents_graphml/2/2bfcc0e0-5447-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/2/2bfcc0e0-5447-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65a6ef6a654de1a5e7d6a78d6989c86b8467c33d --- /dev/null +++ b/graph/incidents_graphml/2/2bfcc0e0-5447-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.138 + 100.64.14.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694837515 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2bfcc0e0-5447-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/2/2c059470-aac0-11ee-a834-01ba9434432f.graphml b/graph/incidents_graphml/2/2c059470-aac0-11ee-a834-01ba9434432f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b678600923be19bbda54fd49e0bed59be584a70a --- /dev/null +++ b/graph/incidents_graphml/2/2c059470-aac0-11ee-a834-01ba9434432f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.246 + 100.64.15.246 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704345284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c059470-aac0-11ee-a834-01ba9434432f + + + diff --git a/graph/incidents_graphml/2/2c08c880-a8ee-11ee-8c6a-79d6a27183d0.graphml b/graph/incidents_graphml/2/2c08c880-a8ee-11ee-8c6a-79d6a27183d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25746a18501cad603ffd2dca40f48b5d0935a1f7 --- /dev/null +++ b/graph/incidents_graphml/2/2c08c880-a8ee-11ee-8c6a-79d6a27183d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.202 + 100.64.36.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704145139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c08c880-a8ee-11ee-8c6a-79d6a27183d0 + + + diff --git a/graph/incidents_graphml/2/2c12b9e0-5447-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/2/2c12b9e0-5447-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9808a561ac90f9c8f88f575e88aca6ab53f2c8cb --- /dev/null +++ b/graph/incidents_graphml/2/2c12b9e0-5447-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.138 + 100.64.14.138 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694837515 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2c12b9e0-5447-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/2/2c1755c0-69e8-11ee-abad-55192da42b01.graphml b/graph/incidents_graphml/2/2c1755c0-69e8-11ee-abad-55192da42b01.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51a53fb08d77c2e703430cfee66a54271f6853a6 --- /dev/null +++ b/graph/incidents_graphml/2/2c1755c0-69e8-11ee-abad-55192da42b01.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.241 + USER-0015-1443.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697215638 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c1755c0-69e8-11ee-abad-55192da42b01 + + + diff --git a/graph/incidents_graphml/2/2c214840-3fa0-11ee-a252-7da02f05b5b3.graphml b/graph/incidents_graphml/2/2c214840-3fa0-11ee-a252-7da02f05b5b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9210d78633f7ec19aaa5253f0f34671442f27540 --- /dev/null +++ b/graph/incidents_graphml/2/2c214840-3fa0-11ee-a252-7da02f05b5b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.180 + 100.64.59.180 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692566766 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c214840-3fa0-11ee-a252-7da02f05b5b3 + + + diff --git a/graph/incidents_graphml/2/2c2969f0-dbb1-11ee-a665-15e5a5884e11.graphml b/graph/incidents_graphml/2/2c2969f0-dbb1-11ee-a665-15e5a5884e11.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ffb5c3d88a41e614028169bdfc820fe511707d98 --- /dev/null +++ b/graph/incidents_graphml/2/2c2969f0-dbb1-11ee-a665-15e5a5884e11.graphml @@ -0,0 +1,445 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.136 + 100.64.2.136 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.193 + 100.64.50.193 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.110 + 100.64.8.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.194 + 100.64.50.194 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.195 + 100.64.50.195 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.65 + 100.64.8.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.196 + 100.64.50.196 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.197 + 100.64.50.197 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726449 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c2969f0-dbb1-11ee-a665-15e5a5884e11 + + + diff --git a/graph/incidents_graphml/2/2c301550-3fa0-11ee-a252-7da02f05b5b3.graphml b/graph/incidents_graphml/2/2c301550-3fa0-11ee-a252-7da02f05b5b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ff812543b00614c82780445d4232503c6088725 --- /dev/null +++ b/graph/incidents_graphml/2/2c301550-3fa0-11ee-a252-7da02f05b5b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.180 + 100.64.59.180 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692566766 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2c301550-3fa0-11ee-a252-7da02f05b5b3 + + + diff --git a/graph/incidents_graphml/2/2c33b480-80eb-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/2/2c33b480-80eb-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cb3e9b5aa803f4c79b33da4fed776be10b5d7b2 --- /dev/null +++ b/graph/incidents_graphml/2/2c33b480-80eb-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.34 + 100.64.14.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699745804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c33b480-80eb-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/2/2c342a10-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/2/2c342a10-999f-11ee-9648-fdeb01eb2c83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3996e2214ec716bf62a44c31105473edc05a2b70 --- /dev/null +++ b/graph/incidents_graphml/2/2c342a10-999f-11ee-9648-fdeb01eb2c83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.133 + 100.64.44.133 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702461941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c342a10-999f-11ee-9648-fdeb01eb2c83 + + + diff --git a/graph/incidents_graphml/2/2c383e10-2cf0-11ed-948a-81f47bd1989a.graphml b/graph/incidents_graphml/2/2c383e10-2cf0-11ed-948a-81f47bd1989a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2733b0c728d9c6ee26afcf010843e4701be3fef0 --- /dev/null +++ b/graph/incidents_graphml/2/2c383e10-2cf0-11ed-948a-81f47bd1989a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.163 + 100.64.79.163 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.128 + 100.64.71.128 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662364556 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c383e10-2cf0-11ed-948a-81f47bd1989a + + + diff --git a/graph/incidents_graphml/2/2c42ab80-69e8-11ee-abad-55192da42b01.graphml b/graph/incidents_graphml/2/2c42ab80-69e8-11ee-abad-55192da42b01.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2029f3b4c951af15d9471bec989b0a40ba3a7d8c --- /dev/null +++ b/graph/incidents_graphml/2/2c42ab80-69e8-11ee-abad-55192da42b01.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697215639 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2c42ab80-69e8-11ee-abad-55192da42b01 + + + diff --git a/graph/incidents_graphml/2/2c44a4d0-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/2/2c44a4d0-999f-11ee-9648-fdeb01eb2c83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df6cc6479fe4a2bfd9e9447b19da1b451df443d8 --- /dev/null +++ b/graph/incidents_graphml/2/2c44a4d0-999f-11ee-9648-fdeb01eb2c83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.133 + 100.64.44.133 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702461941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c44a4d0-999f-11ee-9648-fdeb01eb2c83 + + + diff --git a/graph/incidents_graphml/2/2c4c01c0-3fa0-11ee-a252-7da02f05b5b3.graphml b/graph/incidents_graphml/2/2c4c01c0-3fa0-11ee-a252-7da02f05b5b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e32021ba039e8b1c5f2a70e6a3afa5cb0f8482e --- /dev/null +++ b/graph/incidents_graphml/2/2c4c01c0-3fa0-11ee-a252-7da02f05b5b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.153 + 100.64.62.153 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692566766 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c4c01c0-3fa0-11ee-a252-7da02f05b5b3 + + + diff --git a/graph/incidents_graphml/2/2c56c490-718f-11ee-9fe3-bf96143a208f.graphml b/graph/incidents_graphml/2/2c56c490-718f-11ee-9fe3-bf96143a208f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60dd37860b503cf0ddf1a9d3765582226fb6a0c8 --- /dev/null +++ b/graph/incidents_graphml/2/2c56c490-718f-11ee-9fe3-bf96143a208f.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.75 + 100.64.7.75 + ["Exploiting Host","Exploiting Target"] + 0.81015625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.42.97 + 100.64.42.97 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.68.111 + 100.64.68.111 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c56c490-718f-11ee-9fe3-bf96143a208f + + + diff --git a/graph/incidents_graphml/2/2c57d600-718f-11ee-9fe3-bf96143a208f.graphml b/graph/incidents_graphml/2/2c57d600-718f-11ee-9fe3-bf96143a208f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fde4317efe13f868fec16718fa0cf30fbfe2cd92 --- /dev/null +++ b/graph/incidents_graphml/2/2c57d600-718f-11ee-9fe3-bf96143a208f.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.69 + 100.64.44.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1698057023 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c57d600-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c57d600-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c57d600-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057023 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2c57d600-718f-11ee-9fe3-bf96143a208f + + + diff --git a/graph/incidents_graphml/2/2c5abb30-544e-11ee-862a-9bdfc30b143b.graphml b/graph/incidents_graphml/2/2c5abb30-544e-11ee-862a-9bdfc30b143b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fbb4ba1b89b16ad52b9ba6709042d45c745fa56 --- /dev/null +++ b/graph/incidents_graphml/2/2c5abb30-544e-11ee-862a-9bdfc30b143b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.107 + 100.64.62.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694840522 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2c5abb30-544e-11ee-862a-9bdfc30b143b + + + diff --git a/graph/incidents_graphml/2/2c614ae0-45a8-11ee-a7ad-83797698404e.graphml b/graph/incidents_graphml/2/2c614ae0-45a8-11ee-a7ad-83797698404e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f52d61695f19182172afcd402eec5442bb0c38aa --- /dev/null +++ b/graph/incidents_graphml/2/2c614ae0-45a8-11ee-a7ad-83797698404e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.51 + 100.64.35.51 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693229909 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2c614ae0-45a8-11ee-a7ad-83797698404e + + + diff --git a/graph/incidents_graphml/2/2c677dd0-1aa5-11ee-ae54-3b636b49055b.graphml b/graph/incidents_graphml/2/2c677dd0-1aa5-11ee-ae54-3b636b49055b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8aa0d367b57a5c56573ffe3450a08f8f1b9836ca --- /dev/null +++ b/graph/incidents_graphml/2/2c677dd0-1aa5-11ee-ae54-3b636b49055b.graphml @@ -0,0 +1,467 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.89.161 + 100.64.89.161 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.50.119 + 100.64.50.119 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.148 + 100.64.89.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.68.58 + 100.64.68.58 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.22.113 + 100.64.22.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.162 + 100.64.89.162 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.130 + USER-0015-2030.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.163 + USER-0015-2031.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.164 + 100.64.89.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.165 + 100.64.89.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.166 + 100.64.89.166 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.140 + USER-0015-2028.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c677dd0-1aa5-11ee-ae54-3b636b49055b + + + diff --git a/graph/incidents_graphml/2/2c7017f0-45a8-11ee-a7ad-83797698404e.graphml b/graph/incidents_graphml/2/2c7017f0-45a8-11ee-a7ad-83797698404e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..41ff302989bba7d298c9f269bcaaa99c492e5fea --- /dev/null +++ b/graph/incidents_graphml/2/2c7017f0-45a8-11ee-a7ad-83797698404e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.53 + 100.64.35.53 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693229909 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c7017f0-45a8-11ee-a7ad-83797698404e + + + diff --git a/graph/incidents_graphml/2/2c757d00-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/2/2c757d00-463d-11ed-9048-e52ef683aaf1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbe3209549ae261b631dd42f320ab9216ea0322b --- /dev/null +++ b/graph/incidents_graphml/2/2c757d00-463d-11ed-9048-e52ef683aaf1.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.155 + 100.64.81.155 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.58 + 100.64.1.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.129 + 100.64.71.129 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1665146407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c757d00-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c757d00-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c757d00-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c757d00-463d-11ed-9048-e52ef683aaf1 + + + diff --git a/graph/incidents_graphml/2/2c7efbc0-1476-11ee-877c-f76402fda8f6.graphml b/graph/incidents_graphml/2/2c7efbc0-1476-11ee-877c-f76402fda8f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e02c98b79177468e48fe72bc06894de57493042c --- /dev/null +++ b/graph/incidents_graphml/2/2c7efbc0-1476-11ee-877c-f76402fda8f6.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.75 + 100.64.48.75 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.76 + 100.64.48.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.148 + 100.64.24.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.14 + 100.64.5.14 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687820828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c7efbc0-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c7efbc0-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c7efbc0-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c7efbc0-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c7efbc0-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c7efbc0-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c7efbc0-1476-11ee-877c-f76402fda8f6 + + + INCIDENT_LINK + 1687820828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c7efbc0-1476-11ee-877c-f76402fda8f6 + + + diff --git a/graph/incidents_graphml/2/2c7f1040-5447-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/2/2c7f1040-5447-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..181dc6097206cae2577f4bca1ecf6d136bf5f6cb --- /dev/null +++ b/graph/incidents_graphml/2/2c7f1040-5447-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.140 + 100.64.14.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694837516 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c7f1040-5447-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/2/2c7fcf60-45a8-11ee-a7ad-83797698404e.graphml b/graph/incidents_graphml/2/2c7fcf60-45a8-11ee-a7ad-83797698404e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36fc1ba3e1f737a77b9d08b3cb9425e88ef5083e --- /dev/null +++ b/graph/incidents_graphml/2/2c7fcf60-45a8-11ee-a7ad-83797698404e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.53 + 100.64.35.53 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693229909 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2c7fcf60-45a8-11ee-a7ad-83797698404e + + + diff --git a/graph/incidents_graphml/2/2c898730-ee7c-11ee-8c82-b10f259979aa.graphml b/graph/incidents_graphml/2/2c898730-ee7c-11ee-8c82-b10f259979aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9bf4df91e2199edfce84a26969db82759f1cab1d --- /dev/null +++ b/graph/incidents_graphml/2/2c898730-ee7c-11ee-8c82-b10f259979aa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.223 + 100.64.26.223 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711792758 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2c898730-ee7c-11ee-8c82-b10f259979aa + + + diff --git a/graph/incidents_graphml/2/2c8a8540-299b-11ef-bcba-e72095bb0d10.graphml b/graph/incidents_graphml/2/2c8a8540-299b-11ef-bcba-e72095bb0d10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edc6cf606addbdc00f697ab96bcd0de69c6fad61 --- /dev/null +++ b/graph/incidents_graphml/2/2c8a8540-299b-11ef-bcba-e72095bb0d10.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.104 + 100.64.52.104 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.223 + 100.64.45.223 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.229 + 100.64.38.229 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.202 + 100.64.37.202 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.97 + 100.64.33.97 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.46 + 100.64.60.46 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.253 + 100.64.12.253 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.105 + USER-0015-1205.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.139 + 100.64.35.139 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.92 + 100.64.20.92 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.47 + 100.64.60.47 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.120 + 100.64.8.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.48 + 100.64.60.48 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.238 + 100.64.29.238 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.194 + 100.64.25.194 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293191 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2c8a8540-299b-11ef-bcba-e72095bb0d10 + + + diff --git a/graph/incidents_graphml/2/2c8f11a0-45a8-11ee-a7ad-83797698404e.graphml b/graph/incidents_graphml/2/2c8f11a0-45a8-11ee-a7ad-83797698404e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2522f0d05d1132d11094fd6d1134605efe405954 --- /dev/null +++ b/graph/incidents_graphml/2/2c8f11a0-45a8-11ee-a7ad-83797698404e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.103 + 100.64.10.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693229910 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2c8f11a0-45a8-11ee-a7ad-83797698404e + + + diff --git a/graph/incidents_graphml/2/2c90ea90-5447-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/2/2c90ea90-5447-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..adb8762a87ab1acabd22be7d4f8dc18ae8d836ef --- /dev/null +++ b/graph/incidents_graphml/2/2c90ea90-5447-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.140 + 100.64.14.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694837516 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2c90ea90-5447-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/2/2c9f1730-45a8-11ee-a7ad-83797698404e.graphml b/graph/incidents_graphml/2/2c9f1730-45a8-11ee-a7ad-83797698404e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68ed9854753a02787f938245f78a80102ff966d9 --- /dev/null +++ b/graph/incidents_graphml/2/2c9f1730-45a8-11ee-a7ad-83797698404e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.214 + 100.64.18.214 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693229910 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2c9f1730-45a8-11ee-a7ad-83797698404e + + + diff --git a/graph/incidents_graphml/2/2ca189a0-f6aa-11ec-86ed-01daccdabaa6.graphml b/graph/incidents_graphml/2/2ca189a0-f6aa-11ec-86ed-01daccdabaa6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e14ece25993d20fed7a6d80e9108abcedf909a2e --- /dev/null +++ b/graph/incidents_graphml/2/2ca189a0-f6aa-11ec-86ed-01daccdabaa6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.27 + 100.64.74.27 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.69 + 100.64.72.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656397129 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ca189a0-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397129 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ca189a0-f6aa-11ec-86ed-01daccdabaa6 + + + diff --git a/graph/incidents_graphml/2/2ca3acd0-01d5-11ee-8c41-374f8f3a6a1c.graphml b/graph/incidents_graphml/2/2ca3acd0-01d5-11ee-8c41-374f8f3a6a1c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..409bc58afea815f3f1f199893f2d2d3f5544e70f --- /dev/null +++ b/graph/incidents_graphml/2/2ca3acd0-01d5-11ee-8c41-374f8f3a6a1c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.229 + 100.64.22.229 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.72.178 + 100.64.72.178 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1685772558 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ca3acd0-01d5-11ee-8c41-374f8f3a6a1c + + + INCIDENT_LINK + 1685772558 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ca3acd0-01d5-11ee-8c41-374f8f3a6a1c + + + diff --git a/graph/incidents_graphml/2/2cbfc140-5ce3-11ee-888f-c5a21ae2b888.graphml b/graph/incidents_graphml/2/2cbfc140-5ce3-11ee-888f-c5a21ae2b888.graphml new file mode 100644 index 0000000000000000000000000000000000000000..acf8c809ebf9e1579f16a8b0ee41618ee55da40c --- /dev/null +++ b/graph/incidents_graphml/2/2cbfc140-5ce3-11ee-888f-c5a21ae2b888.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.251 + HOST-6674 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695784127 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2cbfc140-5ce3-11ee-888f-c5a21ae2b888 + + + diff --git a/graph/incidents_graphml/2/2cc884b0-4c99-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/2cc884b0-4c99-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12d1f1d9cc7d2f60a88297a3f2cf4a636c5f7178 --- /dev/null +++ b/graph/incidents_graphml/2/2cc884b0-4c99-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.77 + 100.64.27.77 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693993126 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2cc884b0-4c99-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/2ccdb4a0-1665-11ed-8e94-2117b13ab2d5.graphml b/graph/incidents_graphml/2/2ccdb4a0-1665-11ed-8e94-2117b13ab2d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa17da62a8b37ae32942180578699280d0b7dbd4 --- /dev/null +++ b/graph/incidents_graphml/2/2ccdb4a0-1665-11ed-8e94-2117b13ab2d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.204 + 100.64.92.204 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659885931 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ccdb4a0-1665-11ed-8e94-2117b13ab2d5 + + + diff --git a/graph/incidents_graphml/2/2cd66730-1665-11ed-8e94-2117b13ab2d5.graphml b/graph/incidents_graphml/2/2cd66730-1665-11ed-8e94-2117b13ab2d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc6edb7fb409f9a9fd10e93e03a7e37e8274d735 --- /dev/null +++ b/graph/incidents_graphml/2/2cd66730-1665-11ed-8e94-2117b13ab2d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.204 + 100.64.92.204 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659885931 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2cd66730-1665-11ed-8e94-2117b13ab2d5 + + + diff --git a/graph/incidents_graphml/2/2cde7d80-1665-11ed-8e94-2117b13ab2d5.graphml b/graph/incidents_graphml/2/2cde7d80-1665-11ed-8e94-2117b13ab2d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d040fe0a0a9f10f9622f6227726621801b8dd67 --- /dev/null +++ b/graph/incidents_graphml/2/2cde7d80-1665-11ed-8e94-2117b13ab2d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.53 + 100.64.76.53 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659885931 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2cde7d80-1665-11ed-8e94-2117b13ab2d5 + + + diff --git a/graph/incidents_graphml/2/2ce2c7b0-706d-11ee-bf4b-5f6b66a218e8.graphml b/graph/incidents_graphml/2/2ce2c7b0-706d-11ee-bf4b-5f6b66a218e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..274b51f72c230f47b3e95d5e22a8faba330ce45b --- /dev/null +++ b/graph/incidents_graphml/2/2ce2c7b0-706d-11ee-bf4b-5f6b66a218e8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.178 + 100.64.68.178 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1697932470 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ce2c7b0-706d-11ee-bf4b-5f6b66a218e8 + + + INCIDENT_LINK + 1697932470 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ce2c7b0-706d-11ee-bf4b-5f6b66a218e8 + + + diff --git a/graph/incidents_graphml/2/2ce6e1f0-1665-11ed-8e94-2117b13ab2d5.graphml b/graph/incidents_graphml/2/2ce6e1f0-1665-11ed-8e94-2117b13ab2d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..051a2c2daf612ebed21b13ea76a0969a796bc917 --- /dev/null +++ b/graph/incidents_graphml/2/2ce6e1f0-1665-11ed-8e94-2117b13ab2d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.76.53 + 100.64.76.53 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659885931 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ce6e1f0-1665-11ed-8e94-2117b13ab2d5 + + + diff --git a/graph/incidents_graphml/2/2cea1640-1665-11ed-8e94-2117b13ab2d5.graphml b/graph/incidents_graphml/2/2cea1640-1665-11ed-8e94-2117b13ab2d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58f31389d601309f4a1c58ad5ca0801f792ab844 --- /dev/null +++ b/graph/incidents_graphml/2/2cea1640-1665-11ed-8e94-2117b13ab2d5.graphml @@ -0,0 +1,129 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.93 + 100.64.73.93 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1659885931 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2cea1640-1665-11ed-8e94-2117b13ab2d5 + + + INCIDENT_LINK + 1659885931 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2cea1640-1665-11ed-8e94-2117b13ab2d5 + + + INCIDENT_LINK + 1659885931 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2cea1640-1665-11ed-8e94-2117b13ab2d5 + + + INCIDENT_LINK + 1659885931 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2cea1640-1665-11ed-8e94-2117b13ab2d5 + + + diff --git a/graph/incidents_graphml/2/2ceb1450-45a8-11ee-a7ad-83797698404e.graphml b/graph/incidents_graphml/2/2ceb1450-45a8-11ee-a7ad-83797698404e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b94bbb8cc5344b2379fe1e5c142ea6f1d6cedec --- /dev/null +++ b/graph/incidents_graphml/2/2ceb1450-45a8-11ee-a7ad-83797698404e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.55 + 100.64.35.55 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693229910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ceb1450-45a8-11ee-a7ad-83797698404e + + + diff --git a/graph/incidents_graphml/2/2ced9330-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/2/2ced9330-463d-11ed-9048-e52ef683aaf1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e61cba46f527cd82c1a62f7af84c42e14af2432 --- /dev/null +++ b/graph/incidents_graphml/2/2ced9330-463d-11ed-9048-e52ef683aaf1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.156 + 100.64.81.156 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.81.157 + 100.64.81.157 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1665146407 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ced9330-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146407 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ced9330-463d-11ed-9048-e52ef683aaf1 + + + diff --git a/graph/incidents_graphml/2/2cef1f50-1665-11ed-8e94-2117b13ab2d5.graphml b/graph/incidents_graphml/2/2cef1f50-1665-11ed-8e94-2117b13ab2d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be2c6365aeac469cf5ab2e6d2a4db9e65cfb29b4 --- /dev/null +++ b/graph/incidents_graphml/2/2cef1f50-1665-11ed-8e94-2117b13ab2d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.73.93 + 100.64.73.93 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659885932 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2cef1f50-1665-11ed-8e94-2117b13ab2d5 + + + diff --git a/graph/incidents_graphml/2/2cfb7b60-1665-11ed-8e94-2117b13ab2d5.graphml b/graph/incidents_graphml/2/2cfb7b60-1665-11ed-8e94-2117b13ab2d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4960cbe861d2e001b8c2a337f9dde2747817a698 --- /dev/null +++ b/graph/incidents_graphml/2/2cfb7b60-1665-11ed-8e94-2117b13ab2d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.218 + 100.64.92.218 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659885932 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2cfb7b60-1665-11ed-8e94-2117b13ab2d5 + + + diff --git a/graph/incidents_graphml/2/2cfb8f10-45a8-11ee-a7ad-83797698404e.graphml b/graph/incidents_graphml/2/2cfb8f10-45a8-11ee-a7ad-83797698404e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37dd41e991a8794a564b00eba933c44ae9d4a310 --- /dev/null +++ b/graph/incidents_graphml/2/2cfb8f10-45a8-11ee-a7ad-83797698404e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.55 + 100.64.35.55 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693229910 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2cfb8f10-45a8-11ee-a7ad-83797698404e + + + diff --git a/graph/incidents_graphml/2/2d016ed0-1665-11ed-8e94-2117b13ab2d5.graphml b/graph/incidents_graphml/2/2d016ed0-1665-11ed-8e94-2117b13ab2d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..802f0c2d2480630a5a13484ae7ac438fd12ddb87 --- /dev/null +++ b/graph/incidents_graphml/2/2d016ed0-1665-11ed-8e94-2117b13ab2d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.218 + 100.64.92.218 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659885932 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d016ed0-1665-11ed-8e94-2117b13ab2d5 + + + diff --git a/graph/incidents_graphml/2/2d0f4250-5447-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/2/2d0f4250-5447-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c427487146fe475fed950ac9c2626fe9b656fda --- /dev/null +++ b/graph/incidents_graphml/2/2d0f4250-5447-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.142 + 100.64.14.142 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694837517 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d0f4250-5447-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/2/2d159eb0-dbb1-11ee-a665-15e5a5884e11.graphml b/graph/incidents_graphml/2/2d159eb0-dbb1-11ee-a665-15e5a5884e11.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb93aec2a34b6ae8dc65f6fc5f57fd99e48e69a9 --- /dev/null +++ b/graph/incidents_graphml/2/2d159eb0-dbb1-11ee-a665-15e5a5884e11.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.203 + 100.64.50.203 + [] + 0.578125 + ["Precinct"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.204 + 100.64.50.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.205 + 100.64.50.205 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.239 + 100.64.24.239 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.131 + 100.64.7.131 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.206 + 100.64.50.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.207 + 100.64.50.207 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.208 + 100.64.50.208 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.61 + 100.64.44.61 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.209 + 100.64.50.209 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.210 + 100.64.50.210 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.126 + 100.64.24.126 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.11 + 100.64.25.11 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.214 + 100.64.17.214 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.131 + 100.64.27.131 + ["Exploiting Host"] + 0.8875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.211 + 100.64.50.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.14 + 100.64.6.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.212 + 100.64.50.212 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726450 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d159eb0-dbb1-11ee-a665-15e5a5884e11 + + + diff --git a/graph/incidents_graphml/2/2d1a8090-7920-11ee-91ac-9dbe9218e297.graphml b/graph/incidents_graphml/2/2d1a8090-7920-11ee-91ac-9dbe9218e297.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee8b6689e6b4c2460fbdca28b2eed13fa0f9e060 --- /dev/null +++ b/graph/incidents_graphml/2/2d1a8090-7920-11ee-91ac-9dbe9218e297.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.252 + 100.64.13.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.247 + 100.64.69.247 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1698888959 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d1a8090-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698888959 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d1a8090-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698888959 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d1a8090-7920-11ee-91ac-9dbe9218e297 + + + INCIDENT_LINK + 1698888959 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d1a8090-7920-11ee-91ac-9dbe9218e297 + + + diff --git a/graph/incidents_graphml/2/2d20d2a0-920d-11ee-afdd-6dc3cf6fdc52.graphml b/graph/incidents_graphml/2/2d20d2a0-920d-11ee-afdd-6dc3cf6fdc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d85ebc66fcfb71a56441d0567ad72d6e52242e52 --- /dev/null +++ b/graph/incidents_graphml/2/2d20d2a0-920d-11ee-afdd-6dc3cf6fdc52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.1 + 100.64.17.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701629578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d20d2a0-920d-11ee-afdd-6dc3cf6fdc52 + + + diff --git a/graph/incidents_graphml/2/2d21f690-ea5e-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/2/2d21f690-ea5e-11ee-b380-23a0be8babf0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..309c8a026cf4281ec3aa24044d19a008ab99d359 --- /dev/null +++ b/graph/incidents_graphml/2/2d21f690-ea5e-11ee-b380-23a0be8babf0.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.125 + 100.64.39.125 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.126 + 100.64.39.126 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.39.127 + 100.64.39.127 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.128 + 100.64.39.128 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.129 + 100.64.39.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.104 + USER-0015-1322.example.internal + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.130 + 100.64.39.130 + ["Exploiting Target","Exploiting Host"] + 0.983125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.56 + 100.64.18.56 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d21f690-ea5e-11ee-b380-23a0be8babf0 + + + diff --git a/graph/incidents_graphml/2/2d26bdc0-45a8-11ee-a7ad-83797698404e.graphml b/graph/incidents_graphml/2/2d26bdc0-45a8-11ee-a7ad-83797698404e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71fbdabfb58fe38cd08959a3e7dcbcc3a4852bc3 --- /dev/null +++ b/graph/incidents_graphml/2/2d26bdc0-45a8-11ee-a7ad-83797698404e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.225 + 100.64.34.225 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693229911 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d26bdc0-45a8-11ee-a7ad-83797698404e + + + diff --git a/graph/incidents_graphml/2/2d2a2cb0-4c99-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/2d2a2cb0-4c99-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7fffd2dfd9c4c871e25cbf5e5b90a56494cd7b4 --- /dev/null +++ b/graph/incidents_graphml/2/2d2a2cb0-4c99-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693993126 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d2a2cb0-4c99-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/2d2e5ef0-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/2/2d2e5ef0-50c0-11ed-875b-db834c6ab2cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9867d7a3b4582efa03813687044ef9e3b1c0544d --- /dev/null +++ b/graph/incidents_graphml/2/2d2e5ef0-50c0-11ed-875b-db834c6ab2cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.17 + 100.64.92.17 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1666302184 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d2e5ef0-50c0-11ed-875b-db834c6ab2cd + + + diff --git a/graph/incidents_graphml/2/2d3319e0-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/2/2d3319e0-50c0-11ed-875b-db834c6ab2cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1632609c5bcffe5a094e22ce31c1975260a0df66 --- /dev/null +++ b/graph/incidents_graphml/2/2d3319e0-50c0-11ed-875b-db834c6ab2cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.17 + 100.64.92.17 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1666302184 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d3319e0-50c0-11ed-875b-db834c6ab2cd + + + diff --git a/graph/incidents_graphml/2/2d34a070-45a8-11ee-a7ad-83797698404e.graphml b/graph/incidents_graphml/2/2d34a070-45a8-11ee-a7ad-83797698404e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63c16dd8ac8b2eb53e524b3580e84bbcc1bbb413 --- /dev/null +++ b/graph/incidents_graphml/2/2d34a070-45a8-11ee-a7ad-83797698404e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.57 + 100.64.35.57 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693229911 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d34a070-45a8-11ee-a7ad-83797698404e + + + diff --git a/graph/incidents_graphml/2/2d3a3210-1665-11ed-8e94-2117b13ab2d5.graphml b/graph/incidents_graphml/2/2d3a3210-1665-11ed-8e94-2117b13ab2d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3125251b893feaf84fd303d8d44c80d49f685e7 --- /dev/null +++ b/graph/incidents_graphml/2/2d3a3210-1665-11ed-8e94-2117b13ab2d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.17.142 + 100.64.17.142 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659885932 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2d3a3210-1665-11ed-8e94-2117b13ab2d5 + + + diff --git a/graph/incidents_graphml/2/2d3a3240-4c99-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/2d3a3240-4c99-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8aa7429c6fef67b23257c537893ff08b5ef15e9 --- /dev/null +++ b/graph/incidents_graphml/2/2d3a3240-4c99-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693993126 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d3a3240-4c99-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/2d3c2070-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/2/2d3c2070-1c50-11ed-bd09-797a43d85ced.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f64f90d6ca58f457ea9be5d4f5c938424472cca2 --- /dev/null +++ b/graph/incidents_graphml/2/2d3c2070-1c50-11ed-bd09-797a43d85ced.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.102 + 100.64.86.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660536620 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d3c2070-1c50-11ed-bd09-797a43d85ced + + + diff --git a/graph/incidents_graphml/2/2d3e0a10-ea5e-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/2/2d3e0a10-ea5e-11ee-b380-23a0be8babf0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29a40b37c89c0efb17bd10a4771de235d378d06e --- /dev/null +++ b/graph/incidents_graphml/2/2d3e0a10-ea5e-11ee-b380-23a0be8babf0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.70 + 100.64.13.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711340070 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d3e0a10-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340070 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d3e0a10-ea5e-11ee-b380-23a0be8babf0 + + + diff --git a/graph/incidents_graphml/2/2d41f430-1ca6-11ee-8a30-871cf58c099a.graphml b/graph/incidents_graphml/2/2d41f430-1ca6-11ee-8a30-871cf58c099a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f12eac1a103fcc656c66e218edff803a9f5c54c1 --- /dev/null +++ b/graph/incidents_graphml/2/2d41f430-1ca6-11ee-8a30-871cf58c099a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.74 + 100.64.42.74 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688721054 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d41f430-1ca6-11ee-8a30-871cf58c099a + + + diff --git a/graph/incidents_graphml/2/2d44cd10-45a8-11ee-a7ad-83797698404e.graphml b/graph/incidents_graphml/2/2d44cd10-45a8-11ee-a7ad-83797698404e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f936c8e5b2d8b2aae76690405199961db641f59a --- /dev/null +++ b/graph/incidents_graphml/2/2d44cd10-45a8-11ee-a7ad-83797698404e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.57 + 100.64.35.57 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693229911 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d44cd10-45a8-11ee-a7ad-83797698404e + + + diff --git a/graph/incidents_graphml/2/2d452120-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/2/2d452120-1c50-11ed-bd09-797a43d85ced.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cb49ee80fd578fa820f563d86de0c83adb2c19e --- /dev/null +++ b/graph/incidents_graphml/2/2d452120-1c50-11ed-bd09-797a43d85ced.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.102 + 100.64.86.102 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660536620 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d452120-1c50-11ed-bd09-797a43d85ced + + + diff --git a/graph/incidents_graphml/2/2d4a5140-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/2/2d4a5140-1c50-11ed-bd09-797a43d85ced.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d4786b90535588cefb9aeca17aee60d5d30cf1a --- /dev/null +++ b/graph/incidents_graphml/2/2d4a5140-1c50-11ed-bd09-797a43d85ced.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.106 + 100.64.86.106 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1660536620 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d4a5140-1c50-11ed-bd09-797a43d85ced + + + diff --git a/graph/incidents_graphml/2/2d4b83d0-544e-11ee-862a-9bdfc30b143b.graphml b/graph/incidents_graphml/2/2d4b83d0-544e-11ee-862a-9bdfc30b143b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4faf9c8914d95612debd3f744dc2bbe6314755d --- /dev/null +++ b/graph/incidents_graphml/2/2d4b83d0-544e-11ee-862a-9bdfc30b143b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.229 + 100.64.22.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694840524 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d4b83d0-544e-11ee-862a-9bdfc30b143b + + + diff --git a/graph/incidents_graphml/2/2d4f2d90-6737-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/2d4f2d90-6737-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..044dc3ede14e5cee38fa470dcf08288095d22a60 --- /dev/null +++ b/graph/incidents_graphml/2/2d4f2d90-6737-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.241 + 100.64.53.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696919717 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d4f2d90-6737-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/2d52b5b0-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/2/2d52b5b0-1c50-11ed-bd09-797a43d85ced.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b93e5631f064ff21794d871873491800c0a99b7 --- /dev/null +++ b/graph/incidents_graphml/2/2d52b5b0-1c50-11ed-bd09-797a43d85ced.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.86.106 + 100.64.86.106 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660536620 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d52b5b0-1c50-11ed-bd09-797a43d85ced + + + diff --git a/graph/incidents_graphml/2/2d5493e0-7b03-11ee-a81a-79782e46be48.graphml b/graph/incidents_graphml/2/2d5493e0-7b03-11ee-a81a-79782e46be48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f2d465b3171de23ea7a14cbe2f4e4d8033a603c --- /dev/null +++ b/graph/incidents_graphml/2/2d5493e0-7b03-11ee-a81a-79782e46be48.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-2003.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.20.30 + 100.64.20.30 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1699096407 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d5493e0-7b03-11ee-a81a-79782e46be48 + + + diff --git a/graph/incidents_graphml/2/2d58ab80-920d-11ee-afdd-6dc3cf6fdc52.graphml b/graph/incidents_graphml/2/2d58ab80-920d-11ee-afdd-6dc3cf6fdc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59e06d055b3eb0a389f37c8dac49026448e8fd64 --- /dev/null +++ b/graph/incidents_graphml/2/2d58ab80-920d-11ee-afdd-6dc3cf6fdc52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.25 + 100.64.22.25 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701629578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d58ab80-920d-11ee-afdd-6dc3cf6fdc52 + + + diff --git a/graph/incidents_graphml/2/2d5c9ad0-544e-11ee-862a-9bdfc30b143b.graphml b/graph/incidents_graphml/2/2d5c9ad0-544e-11ee-862a-9bdfc30b143b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86cd72d6f359e2cba611040c67403f8a0bec606a --- /dev/null +++ b/graph/incidents_graphml/2/2d5c9ad0-544e-11ee-862a-9bdfc30b143b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.229 + 100.64.22.229 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694840524 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d5c9ad0-544e-11ee-862a-9bdfc30b143b + + + diff --git a/graph/incidents_graphml/2/2d626770-6737-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/2d626770-6737-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0bfca1afb2d5d54fb6421544d86989ac6b3b4153 --- /dev/null +++ b/graph/incidents_graphml/2/2d626770-6737-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.241 + 100.64.53.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696919717 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2d626770-6737-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/2d651a90-654a-11ee-a13a-239f8a76841b.graphml b/graph/incidents_graphml/2/2d651a90-654a-11ee-a13a-239f8a76841b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b231373861ca2adec7860415305418a864d67507 --- /dev/null +++ b/graph/incidents_graphml/2/2d651a90-654a-11ee-a13a-239f8a76841b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.74 + 100.64.20.74 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696707975 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d651a90-654a-11ee-a13a-239f8a76841b + + + diff --git a/graph/incidents_graphml/2/2d692640-920d-11ee-afdd-6dc3cf6fdc52.graphml b/graph/incidents_graphml/2/2d692640-920d-11ee-afdd-6dc3cf6fdc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f5335b68c3c453fad3e8b7110d06b3d729cd2cc --- /dev/null +++ b/graph/incidents_graphml/2/2d692640-920d-11ee-afdd-6dc3cf6fdc52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.25 + 100.64.22.25 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701629578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2d692640-920d-11ee-afdd-6dc3cf6fdc52 + + + diff --git a/graph/incidents_graphml/2/2d709840-6737-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/2d709840-6737-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc779bc9bd6d28ab654bde3aeb9fc74470409e66 --- /dev/null +++ b/graph/incidents_graphml/2/2d709840-6737-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.243 + 100.64.53.243 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696919717 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d709840-6737-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/2d735820-3e4a-11ee-8b2d-bf05437911b6.graphml b/graph/incidents_graphml/2/2d735820-3e4a-11ee-8b2d-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8027aee8608fb36b8008a5888fe848d70fd8022 --- /dev/null +++ b/graph/incidents_graphml/2/2d735820-3e4a-11ee-8b2d-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.190 + 100.64.36.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692419880 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d735820-3e4a-11ee-8b2d-bf05437911b6 + + + diff --git a/graph/incidents_graphml/2/2d739980-654a-11ee-a13a-239f8a76841b.graphml b/graph/incidents_graphml/2/2d739980-654a-11ee-a13a-239f8a76841b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c56669c0557ca29cabd6569ea479c25f3ca8a472 --- /dev/null +++ b/graph/incidents_graphml/2/2d739980-654a-11ee-a13a-239f8a76841b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.74 + 100.64.20.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696707976 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d739980-654a-11ee-a13a-239f8a76841b + + + diff --git a/graph/incidents_graphml/2/2d7aec90-05a8-11ef-8a49-f14dcee941df.graphml b/graph/incidents_graphml/2/2d7aec90-05a8-11ef-8a49-f14dcee941df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a7abe27a3c3f5eb520b9e1ae81f7a62ccee9b49 --- /dev/null +++ b/graph/incidents_graphml/2/2d7aec90-05a8-11ef-8a49-f14dcee941df.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.92 + 100.64.92.92 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-2093.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.14.251 + 100.64.14.251 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.112 + 100.64.8.112 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.189 + 100.64.17.189 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.18.82 + USER-0015-2094.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714340534 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d7aec90-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340534 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d7aec90-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340534 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d7aec90-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340534 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d7aec90-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340534 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d7aec90-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340534 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d7aec90-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340534 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d7aec90-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340534 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d7aec90-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340534 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d7aec90-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340534 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d7aec90-05a8-11ef-8a49-f14dcee941df + + + diff --git a/graph/incidents_graphml/2/2d7e7af0-6737-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/2d7e7af0-6737-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76e34ef6d48c436cc4e892702da5fbf387db5858 --- /dev/null +++ b/graph/incidents_graphml/2/2d7e7af0-6737-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.243 + 100.64.53.243 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696919717 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d7e7af0-6737-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/2d84e450-3e4a-11ee-8b2d-bf05437911b6.graphml b/graph/incidents_graphml/2/2d84e450-3e4a-11ee-8b2d-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55ec685877675d7fbecc464f4337582e9ec42e90 --- /dev/null +++ b/graph/incidents_graphml/2/2d84e450-3e4a-11ee-8b2d-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.190 + 100.64.36.190 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692419880 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2d84e450-3e4a-11ee-8b2d-bf05437911b6 + + + diff --git a/graph/incidents_graphml/2/2d8e0b50-6737-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/2d8e0b50-6737-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ed85797c0a05cff4e59683ecc91741d8e1bed47 --- /dev/null +++ b/graph/incidents_graphml/2/2d8e0b50-6737-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.241 + 100.64.53.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696919718 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d8e0b50-6737-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/2d972440-3c0f-11ee-96ec-5323ee82cf36.graphml b/graph/incidents_graphml/2/2d972440-3c0f-11ee-96ec-5323ee82cf36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d316a5b2e639b4f09b7660c23528ddfee75dd65b --- /dev/null +++ b/graph/incidents_graphml/2/2d972440-3c0f-11ee-96ec-5323ee82cf36.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect"] + + + INCIDENT_LINK + 1692174638 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d972440-3c0f-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692174638 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d972440-3c0f-11ee-96ec-5323ee82cf36 + + + diff --git a/graph/incidents_graphml/2/2d976940-7b03-11ee-a81a-79782e46be48.graphml b/graph/incidents_graphml/2/2d976940-7b03-11ee-a81a-79782e46be48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7185be4fc254a79e13faa90daf8cdc70aee16cf7 --- /dev/null +++ b/graph/incidents_graphml/2/2d976940-7b03-11ee-a81a-79782e46be48.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.190.96.179 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1699096407 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2d976940-7b03-11ee-a81a-79782e46be48 + + + INCIDENT_LINK + 1699096407 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2d976940-7b03-11ee-a81a-79782e46be48 + + + INCIDENT_LINK + 1699096407 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2d976940-7b03-11ee-a81a-79782e46be48 + + + diff --git a/graph/incidents_graphml/2/2d9980b0-9e24-11ee-9ce0-3dd61bd6a247.graphml b/graph/incidents_graphml/2/2d9980b0-9e24-11ee-9ce0-3dd61bd6a247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a33dc0b10442b819698affff3f8a9b94f643d4d --- /dev/null +++ b/graph/incidents_graphml/2/2d9980b0-9e24-11ee-9ce0-3dd61bd6a247.graphml @@ -0,0 +1,129 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.24 + 100.64.21.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.176 + 100.64.5.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.154 + 100.64.38.154 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702958871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d9980b0-9e24-11ee-9ce0-3dd61bd6a247 + + + INCIDENT_LINK + 1702958871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d9980b0-9e24-11ee-9ce0-3dd61bd6a247 + + + INCIDENT_LINK + 1702958871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d9980b0-9e24-11ee-9ce0-3dd61bd6a247 + + + INCIDENT_LINK + 1702958871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2d9980b0-9e24-11ee-9ce0-3dd61bd6a247 + + + diff --git a/graph/incidents_graphml/2/2d9d4d90-6737-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/2d9d4d90-6737-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f07524ed7dcad023e0bcce5a82666bb0f2d97e16 --- /dev/null +++ b/graph/incidents_graphml/2/2d9d4d90-6737-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.241 + 100.64.53.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696919718 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2d9d4d90-6737-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/2d9ee580-3980-11ef-bdca-fd3640be1aae.graphml b/graph/incidents_graphml/2/2d9ee580-3980-11ef-bdca-fd3640be1aae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ce8543360b62ca72e06618a7c7d925699f6ccf2 --- /dev/null +++ b/graph/incidents_graphml/2/2d9ee580-3980-11ef-bdca-fd3640be1aae.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.151 + 100.64.4.151 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.129 + 100.64.59.129 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.219 + 100.64.37.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d9ee580-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d9ee580-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d9ee580-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d9ee580-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d9ee580-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d9ee580-3980-11ef-bdca-fd3640be1aae + + + diff --git a/graph/incidents_graphml/2/2d9ef6f0-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/2/2d9ef6f0-1f88-11ee-b26a-cbff99af2cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0129d15d7434532a79a2b324049aa84820403bf4 --- /dev/null +++ b/graph/incidents_graphml/2/2d9ef6f0-1f88-11ee-b26a-cbff99af2cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.198 + 100.64.58.198 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689038023 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2d9ef6f0-1f88-11ee-b26a-cbff99af2cd4 + + + diff --git a/graph/incidents_graphml/2/2da826b0-9e24-11ee-9ce0-3dd61bd6a247.graphml b/graph/incidents_graphml/2/2da826b0-9e24-11ee-9ce0-3dd61bd6a247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36f4f0a45eceaeae3207b6f018cede953cd08d24 --- /dev/null +++ b/graph/incidents_graphml/2/2da826b0-9e24-11ee-9ce0-3dd61bd6a247.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.24 + 100.64.21.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702958871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2da826b0-9e24-11ee-9ce0-3dd61bd6a247 + + + diff --git a/graph/incidents_graphml/2/2daa7e40-3980-11ef-bdca-fd3640be1aae.graphml b/graph/incidents_graphml/2/2daa7e40-3980-11ef-bdca-fd3640be1aae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c840877b015cb72335caff82f9691189a5068d83 --- /dev/null +++ b/graph/incidents_graphml/2/2daa7e40-3980-11ef-bdca-fd3640be1aae.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.135 + 100.64.59.135 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.136 + 100.64.59.136 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.83 + 100.64.28.83 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.137 + 100.64.59.137 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.96 + 100.64.28.96 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.220 + 100.64.36.220 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.138 + 100.64.59.138 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.139 + 100.64.59.139 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2daa7e40-3980-11ef-bdca-fd3640be1aae + + + diff --git a/graph/incidents_graphml/2/2dacddf0-6737-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/2dacddf0-6737-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f400860b9c576568f0bba015528236b252ce5e45 --- /dev/null +++ b/graph/incidents_graphml/2/2dacddf0-6737-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.241 + 100.64.53.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696919718 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2dacddf0-6737-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/2db2a090-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/2/2db2a090-be91-11ed-9416-c54055a72e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..810c482ab2dcf51cb551bf455397bd0463617304 --- /dev/null +++ b/graph/incidents_graphml/2/2db2a090-be91-11ed-9416-c54055a72e53.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.182 + 100.64.79.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.86 + 100.64.76.86 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1678376626 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2db2a090-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376626 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2db2a090-be91-11ed-9416-c54055a72e53 + + + diff --git a/graph/incidents_graphml/2/2db5a1d0-3980-11ef-bdca-fd3640be1aae.graphml b/graph/incidents_graphml/2/2db5a1d0-3980-11ef-bdca-fd3640be1aae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50f5459143bf06c4a06f518fede21fab87c5e717 --- /dev/null +++ b/graph/incidents_graphml/2/2db5a1d0-3980-11ef-bdca-fd3640be1aae.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.145 + 100.64.59.145 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.146 + 100.64.59.146 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.147 + 100.64.59.147 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2db5a1d0-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2db5a1d0-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2db5a1d0-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2db5a1d0-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2db5a1d0-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2db5a1d0-3980-11ef-bdca-fd3640be1aae + + + diff --git a/graph/incidents_graphml/2/2dba3850-4c44-11ee-b1bc-8d691f441630.graphml b/graph/incidents_graphml/2/2dba3850-4c44-11ee-b1bc-8d691f441630.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2334bf841f58314cb610d97af4e1e14451b85aaf --- /dev/null +++ b/graph/incidents_graphml/2/2dba3850-4c44-11ee-b1bc-8d691f441630.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.176 + 100.64.5.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693956620 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2dba3850-4c44-11ee-b1bc-8d691f441630 + + + diff --git a/graph/incidents_graphml/2/2dbc6e50-6737-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/2dbc6e50-6737-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e782a9cf38b4c2861342ac6ff19d30852ce815f0 --- /dev/null +++ b/graph/incidents_graphml/2/2dbc6e50-6737-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.241 + 100.64.53.241 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696919718 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dbc6e50-6737-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/2dc0ec70-3980-11ef-bdca-fd3640be1aae.graphml b/graph/incidents_graphml/2/2dc0ec70-3980-11ef-bdca-fd3640be1aae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf2a2f2c96f387fa4423ff035b6426a32fe132bd --- /dev/null +++ b/graph/incidents_graphml/2/2dc0ec70-3980-11ef-bdca-fd3640be1aae.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.151 + 100.64.59.151 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.163 + 100.64.7.163 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.130 + 100.64.9.130 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.152 + 100.64.59.152 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.168 + 100.64.41.168 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.153 + 100.64.59.153 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.254 + 100.64.9.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.253 + 100.64.20.253 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + INCIDENT_LINK + 1720040815 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dc0ec70-3980-11ef-bdca-fd3640be1aae + + + diff --git a/graph/incidents_graphml/2/2dc2ab90-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/2/2dc2ab90-1f88-11ee-b26a-cbff99af2cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67d5a1194eedd9c7505835de15c52ab6cff31823 --- /dev/null +++ b/graph/incidents_graphml/2/2dc2ab90-1f88-11ee-b26a-cbff99af2cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.198 + 100.64.58.198 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689038024 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2dc2ab90-1f88-11ee-b26a-cbff99af2cd4 + + + diff --git a/graph/incidents_graphml/2/2dcb4f50-4c44-11ee-b1bc-8d691f441630.graphml b/graph/incidents_graphml/2/2dcb4f50-4c44-11ee-b1bc-8d691f441630.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59598c3d46be3aa61c22d4ac218ca878ecb2ba87 --- /dev/null +++ b/graph/incidents_graphml/2/2dcb4f50-4c44-11ee-b1bc-8d691f441630.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.176 + 100.64.5.176 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693956620 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2dcb4f50-4c44-11ee-b1bc-8d691f441630 + + + diff --git a/graph/incidents_graphml/2/2dce1d00-44c6-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/2/2dce1d00-44c6-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9d9740d29f7b5a2f6531998ea04179f29159371 --- /dev/null +++ b/graph/incidents_graphml/2/2dce1d00-44c6-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.30 + 100.64.40.30 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693132845 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2dce1d00-44c6-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/2/2dd3fd10-7b03-11ee-a81a-79782e46be48.graphml b/graph/incidents_graphml/2/2dd3fd10-7b03-11ee-a81a-79782e46be48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb465ba0055464867bc54f813f1feaa1e1df3be9 --- /dev/null +++ b/graph/incidents_graphml/2/2dd3fd10-7b03-11ee-a81a-79782e46be48.graphml @@ -0,0 +1,84 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.193 + 100.64.87.193 + ["Exploiting Host"] + 0.4375 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-2003.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + CRED + CRED-0013 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + INCIDENT_LINK + 1699096407 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 2dd3fd10-7b03-11ee-a81a-79782e46be48 + + + INCIDENT_LINK + 1699096407 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 2dd3fd10-7b03-11ee-a81a-79782e46be48 + + + diff --git a/graph/incidents_graphml/2/2ddfa930-44c6-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/2/2ddfa930-44c6-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2e54973ad0ef9abedddd98f68c70b8c088b9120 --- /dev/null +++ b/graph/incidents_graphml/2/2ddfa930-44c6-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.187 + 100.64.49.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693132845 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ddfa930-44c6-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/2/2de14380-7b03-11ee-a81a-79782e46be48.graphml b/graph/incidents_graphml/2/2de14380-7b03-11ee-a81a-79782e46be48.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf7c1ada7d79a5fadce00b256a4df4af3493e30c --- /dev/null +++ b/graph/incidents_graphml/2/2de14380-7b03-11ee-a81a-79782e46be48.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-2003.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.87.193 + 100.64.87.193 + ["Exploiting Host"] + 0.4375 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1699096408 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2de14380-7b03-11ee-a81a-79782e46be48 + + + diff --git a/graph/incidents_graphml/2/2dec7dc0-2cf0-11ed-948a-81f47bd1989a.graphml b/graph/incidents_graphml/2/2dec7dc0-2cf0-11ed-948a-81f47bd1989a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93d3c794ee105be647af59591526712188266237 --- /dev/null +++ b/graph/incidents_graphml/2/2dec7dc0-2cf0-11ed-948a-81f47bd1989a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.164 + 100.64.79.164 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.28 + 100.64.1.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1662364559 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2dec7dc0-2cf0-11ed-948a-81f47bd1989a + + + diff --git a/graph/incidents_graphml/2/2def7170-772b-11ee-979b-2388a139fa0e.graphml b/graph/incidents_graphml/2/2def7170-772b-11ee-979b-2388a139fa0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f511bfd1761556867ddc11d2d2d9a08bb276860c --- /dev/null +++ b/graph/incidents_graphml/2/2def7170-772b-11ee-979b-2388a139fa0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.115 + 100.64.65.115 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698673783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2def7170-772b-11ee-979b-2388a139fa0e + + + diff --git a/graph/incidents_graphml/2/2df07560-2cf0-11ed-948a-81f47bd1989a.graphml b/graph/incidents_graphml/2/2df07560-2cf0-11ed-948a-81f47bd1989a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e227816ff2f76e7b7c45e54c06a5366e7cf4efba --- /dev/null +++ b/graph/incidents_graphml/2/2df07560-2cf0-11ed-948a-81f47bd1989a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.28 + 100.64.1.28 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.79.164 + 100.64.79.164 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1662364559 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2df07560-2cf0-11ed-948a-81f47bd1989a + + + diff --git a/graph/incidents_graphml/2/2df30320-3937-11ef-a411-6df7c82319e6.graphml b/graph/incidents_graphml/2/2df30320-3937-11ef-a411-6df7c82319e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..709a21457fd1601fd9a452ac04c948cd1878d7c3 --- /dev/null +++ b/graph/incidents_graphml/2/2df30320-3937-11ef-a411-6df7c82319e6.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.107 + 100.64.20.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.26 + 100.64.7.26 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.71 + 100.64.41.71 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720009462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2df30320-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2df30320-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2df30320-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2df30320-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2df30320-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2df30320-3937-11ef-a411-6df7c82319e6 + + + diff --git a/graph/incidents_graphml/2/2df4d9e0-fbbf-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/2/2df4d9e0-fbbf-11ed-ae6a-5f6768ebee7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..404b3653955ac8a23857014c3b0462bfa06b157d --- /dev/null +++ b/graph/incidents_graphml/2/2df4d9e0-fbbf-11ed-ae6a-5f6768ebee7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.48 + 100.64.14.48 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685103404 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2df4d9e0-fbbf-11ed-ae6a-5f6768ebee7b + + + diff --git a/graph/incidents_graphml/2/2dfd5750-b8c1-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/2/2dfd5750-b8c1-11ed-8865-15eeb644fed8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8ba887894c0a36c5fc2eca4cce7e1e1699aa2d1 --- /dev/null +++ b/graph/incidents_graphml/2/2dfd5750-b8c1-11ed-8865-15eeb644fed8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.148 + 100.64.82.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 100.64.84.158 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1677737535 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2dfd5750-b8c1-11ed-8865-15eeb644fed8 + + + diff --git a/graph/incidents_graphml/2/2dfedf80-3fc5-11ef-8c1a-53987decb6d6.graphml b/graph/incidents_graphml/2/2dfedf80-3fc5-11ef-8c1a-53987decb6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93c0617174d9593b26814b107137ccdf75b5ee84 --- /dev/null +++ b/graph/incidents_graphml/2/2dfedf80-3fc5-11ef-8c1a-53987decb6d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.128 + 100.64.26.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720730158 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2dfedf80-3fc5-11ef-8c1a-53987decb6d6 + + + diff --git a/graph/incidents_graphml/2/2e032fc0-3937-11ef-a411-6df7c82319e6.graphml b/graph/incidents_graphml/2/2e032fc0-3937-11ef-a411-6df7c82319e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cac9b162044d941f509827a652fcc523093b376 --- /dev/null +++ b/graph/incidents_graphml/2/2e032fc0-3937-11ef-a411-6df7c82319e6.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.73 + 100.64.41.73 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.74 + 100.64.41.74 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720009463 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e032fc0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009463 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e032fc0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009463 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e032fc0-3937-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009463 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e032fc0-3937-11ef-a411-6df7c82319e6 + + + diff --git a/graph/incidents_graphml/2/2e045900-772b-11ee-979b-2388a139fa0e.graphml b/graph/incidents_graphml/2/2e045900-772b-11ee-979b-2388a139fa0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..094aa9540a190d481bfbb1da2f3fae13ee431d75 --- /dev/null +++ b/graph/incidents_graphml/2/2e045900-772b-11ee-979b-2388a139fa0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.115 + 100.64.65.115 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698673783 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e045900-772b-11ee-979b-2388a139fa0e + + + diff --git a/graph/incidents_graphml/2/2e0482a0-889b-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/2/2e0482a0-889b-11ee-9ada-6590fb922310.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b48562553ff9192a207274ed2060a2a141918fe --- /dev/null +++ b/graph/incidents_graphml/2/2e0482a0-889b-11ee-9ada-6590fb922310.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.61 + 100.64.47.61 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700591056 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e0482a0-889b-11ee-9ada-6590fb922310 + + + diff --git a/graph/incidents_graphml/2/2e0ab560-6737-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/2e0ab560-6737-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7786d378540043b4e049bac1b303f061cfa7ce01 --- /dev/null +++ b/graph/incidents_graphml/2/2e0ab560-6737-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.108 + 100.64.24.108 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696919718 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e0ab560-6737-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/2e159710-772b-11ee-979b-2388a139fa0e.graphml b/graph/incidents_graphml/2/2e159710-772b-11ee-979b-2388a139fa0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78b51e15f82b2c743b6da5c5d232bf14663cb043 --- /dev/null +++ b/graph/incidents_graphml/2/2e159710-772b-11ee-979b-2388a139fa0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.63 + 100.64.38.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698673783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e159710-772b-11ee-979b-2388a139fa0e + + + diff --git a/graph/incidents_graphml/2/2e1707e0-fbbf-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/2/2e1707e0-fbbf-11ed-ae6a-5f6768ebee7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9232e31d553ec907117f945f21307a0335aeb495 --- /dev/null +++ b/graph/incidents_graphml/2/2e1707e0-fbbf-11ed-ae6a-5f6768ebee7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.48 + 100.64.14.48 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685103405 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e1707e0-fbbf-11ed-ae6a-5f6768ebee7b + + + diff --git a/graph/incidents_graphml/2/2e199140-889b-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/2/2e199140-889b-11ee-9ada-6590fb922310.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8dc250414b4167fcdc042e35dd3c12689fa2aed --- /dev/null +++ b/graph/incidents_graphml/2/2e199140-889b-11ee-9ada-6590fb922310.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.61 + 100.64.47.61 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700591057 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e199140-889b-11ee-9ada-6590fb922310 + + + diff --git a/graph/incidents_graphml/2/2e1a45c0-6737-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/2/2e1a45c0-6737-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9df3a89ff669d6002555d03bd2e58aaac747285a --- /dev/null +++ b/graph/incidents_graphml/2/2e1a45c0-6737-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.108 + 100.64.24.108 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696919719 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e1a45c0-6737-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/2/2e226350-299b-11ef-bcba-e72095bb0d10.graphml b/graph/incidents_graphml/2/2e226350-299b-11ef-bcba-e72095bb0d10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8bdd1720a2b40fd50a0f8ea7fcf593482f0e892d --- /dev/null +++ b/graph/incidents_graphml/2/2e226350-299b-11ef-bcba-e72095bb0d10.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.53 + 100.64.60.53 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.54 + 100.64.60.54 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.55 + 100.64.60.55 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.56 + 100.64.60.56 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.66 + 100.64.6.66 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.237 + 100.64.38.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.130 + 100.64.9.130 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.4 + 100.64.60.4 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.164 + 100.64.25.164 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.159 + 100.64.32.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.57 + 100.64.60.57 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.58 + 100.64.60.58 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.59 + 100.64.60.59 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.67 + 100.64.50.67 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e226350-299b-11ef-bcba-e72095bb0d10 + + + diff --git a/graph/incidents_graphml/2/2e230490-772b-11ee-979b-2388a139fa0e.graphml b/graph/incidents_graphml/2/2e230490-772b-11ee-979b-2388a139fa0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..304b327af276b5882bcceaf8cd765a735e1f3c61 --- /dev/null +++ b/graph/incidents_graphml/2/2e230490-772b-11ee-979b-2388a139fa0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.63 + 100.64.38.63 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698673783 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e230490-772b-11ee-979b-2388a139fa0e + + + diff --git a/graph/incidents_graphml/2/2e23a7e0-4c99-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/2e23a7e0-4c99-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6a0d42ee505dd19d04b917df2e254df13bb437a --- /dev/null +++ b/graph/incidents_graphml/2/2e23a7e0-4c99-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.79 + 100.64.27.79 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693993128 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e23a7e0-4c99-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/2e28d5b0-3fc5-11ef-8c1a-53987decb6d6.graphml b/graph/incidents_graphml/2/2e28d5b0-3fc5-11ef-8c1a-53987decb6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4999e4ab7baa771a95bb0e55a9e534e310124232 --- /dev/null +++ b/graph/incidents_graphml/2/2e28d5b0-3fc5-11ef-8c1a-53987decb6d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.211 + 100.64.42.211 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720730158 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e28d5b0-3fc5-11ef-8c1a-53987decb6d6 + + + diff --git a/graph/incidents_graphml/2/2e2e3960-fbbf-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/2/2e2e3960-fbbf-11ed-ae6a-5f6768ebee7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f043e2c311f16a22d2ed45f8b0874d3610538390 --- /dev/null +++ b/graph/incidents_graphml/2/2e2e3960-fbbf-11ed-ae6a-5f6768ebee7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.61 + 100.64.12.61 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685103405 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e2e3960-fbbf-11ed-ae6a-5f6768ebee7b + + + diff --git a/graph/incidents_graphml/2/2e306d10-299b-11ef-bcba-e72095bb0d10.graphml b/graph/incidents_graphml/2/2e306d10-299b-11ef-bcba-e72095bb0d10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ca6060b3cef3b64c0dca2654a2192813fcbcdd2 --- /dev/null +++ b/graph/incidents_graphml/2/2e306d10-299b-11ef-bcba-e72095bb0d10.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.67 + 100.64.60.67 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718293194 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e306d10-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293194 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e306d10-299b-11ef-bcba-e72095bb0d10 + + + diff --git a/graph/incidents_graphml/2/2e325f90-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/2/2e325f90-5489-11ee-aade-a558f2065e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61669811e01c38b801e86670ffbc723088608cd0 --- /dev/null +++ b/graph/incidents_graphml/2/2e325f90-5489-11ee-aade-a558f2065e36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.89 + 100.64.47.89 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694865865 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e325f90-5489-11ee-aade-a558f2065e36 + + + diff --git a/graph/incidents_graphml/2/2e3821f0-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/2/2e3821f0-0948-11ee-899e-3d5be197ab3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d4a4d72a4b748d75e61299745505237683bc9ed --- /dev/null +++ b/graph/incidents_graphml/2/2e3821f0-0948-11ee-899e-3d5be197ab3b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.110 + 100.64.8.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.114 + 100.64.71.114 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686591611 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e3821f0-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591611 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e3821f0-0948-11ee-899e-3d5be197ab3b + + + diff --git a/graph/incidents_graphml/2/2e3c6d20-4388-11ef-ada3-4f706d22771d.graphml b/graph/incidents_graphml/2/2e3c6d20-4388-11ef-ada3-4f706d22771d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49a79e81986383a5a24ce5a6600ef3070a446f84 --- /dev/null +++ b/graph/incidents_graphml/2/2e3c6d20-4388-11ef-ada3-4f706d22771d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.243 + 100.64.95.243 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1721143764 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e3c6d20-4388-11ef-ada3-4f706d22771d + + + diff --git a/graph/incidents_graphml/2/2e4068e0-0b6c-11ed-bc4c-114b5035f7dd.graphml b/graph/incidents_graphml/2/2e4068e0-0b6c-11ed-bc4c-114b5035f7dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec3258eecc70669d8b4b64ecbfea922979afed01 --- /dev/null +++ b/graph/incidents_graphml/2/2e4068e0-0b6c-11ed-bc4c-114b5035f7dd.graphml @@ -0,0 +1,753 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.21 + 100.64.71.21 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.166 + 100.64.76.166 + ["Exploiting Host","Exploiting Target"] + 0.940673828125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.167 + 100.64.76.167 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.80 + 100.64.71.80 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.168 + 100.64.76.168 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.76.169 + 100.64.76.169 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.238 + 100.64.71.238 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.170 + 100.64.76.170 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.253 + 100.64.70.253 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.171 + 100.64.76.171 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.104 + 100.64.72.104 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.172 + 100.64.76.172 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.173 + 100.64.76.173 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.19 + 100.64.76.19 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.19.150 + 100.64.19.150 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.174 + 100.64.76.174 + ["Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.175 + 100.64.76.175 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.254 + 100.64.71.254 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.252 + 100.64.71.252 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.176 + 100.64.76.176 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679477 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e4068e0-0b6c-11ed-bc4c-114b5035f7dd + + + diff --git a/graph/incidents_graphml/2/2e420d10-654a-11ee-a13a-239f8a76841b.graphml b/graph/incidents_graphml/2/2e420d10-654a-11ee-a13a-239f8a76841b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..636d8507d58694415560e27aa6d4960d2e663a25 --- /dev/null +++ b/graph/incidents_graphml/2/2e420d10-654a-11ee-a13a-239f8a76841b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.152 + 100.64.7.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696707977 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e420d10-654a-11ee-a13a-239f8a76841b + + + diff --git a/graph/incidents_graphml/2/2e49d7b0-fbbf-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/2/2e49d7b0-fbbf-11ed-ae6a-5f6768ebee7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc8c5e9d524e851bb94c26906fa91e329d737e24 --- /dev/null +++ b/graph/incidents_graphml/2/2e49d7b0-fbbf-11ed-ae6a-5f6768ebee7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.65.32 + 100.64.65.32 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685103405 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e49d7b0-fbbf-11ed-ae6a-5f6768ebee7b + + + diff --git a/graph/incidents_graphml/2/2e4b17a0-aac0-11ee-a834-01ba9434432f.graphml b/graph/incidents_graphml/2/2e4b17a0-aac0-11ee-a834-01ba9434432f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f8ed181ca1cb8799f1e3d0d1cc81c61308301e4 --- /dev/null +++ b/graph/incidents_graphml/2/2e4b17a0-aac0-11ee-a834-01ba9434432f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.114 + 100.64.54.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704345288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e4b17a0-aac0-11ee-a834-01ba9434432f + + + diff --git a/graph/incidents_graphml/2/2e5071b0-3e4a-11ee-8b2d-bf05437911b6.graphml b/graph/incidents_graphml/2/2e5071b0-3e4a-11ee-8b2d-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..257cbf3a80f955d02565206dabbdb160ab762ccc --- /dev/null +++ b/graph/incidents_graphml/2/2e5071b0-3e4a-11ee-8b2d-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.192 + 100.64.36.192 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692419882 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e5071b0-3e4a-11ee-8b2d-bf05437911b6 + + + diff --git a/graph/incidents_graphml/2/2e51a830-2cf0-11ed-948a-81f47bd1989a.graphml b/graph/incidents_graphml/2/2e51a830-2cf0-11ed-948a-81f47bd1989a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf40c79af6d4dae877fdc61d966a5fdad830088f --- /dev/null +++ b/graph/incidents_graphml/2/2e51a830-2cf0-11ed-948a-81f47bd1989a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.129 + 100.64.71.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.37 + 100.64.1.37 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662364559 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e51a830-2cf0-11ed-948a-81f47bd1989a + + + diff --git a/graph/incidents_graphml/2/2e53ecc0-4388-11ef-ada3-4f706d22771d.graphml b/graph/incidents_graphml/2/2e53ecc0-4388-11ef-ada3-4f706d22771d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90b8c0bdbc8c7473564c47ef3d860eadbd0b8183 --- /dev/null +++ b/graph/incidents_graphml/2/2e53ecc0-4388-11ef-ada3-4f706d22771d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.243 + 100.64.95.243 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721143764 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e53ecc0-4388-11ef-ada3-4f706d22771d + + + diff --git a/graph/incidents_graphml/2/2e574e80-152d-11ef-94b2-9fdc46810273.graphml b/graph/incidents_graphml/2/2e574e80-152d-11ef-94b2-9fdc46810273.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4f006bc6487444ae5ba97ae08aef7d0646a048e --- /dev/null +++ b/graph/incidents_graphml/2/2e574e80-152d-11ef-94b2-9fdc46810273.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.162 + USER-0015-2036.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1716046926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e574e80-152d-11ef-94b2-9fdc46810273 + + + diff --git a/graph/incidents_graphml/2/2e61fde0-3e4a-11ee-8b2d-bf05437911b6.graphml b/graph/incidents_graphml/2/2e61fde0-3e4a-11ee-8b2d-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f96c7eb4d3b997e0c1eae1ae4cd9d7d9a56bc4ab --- /dev/null +++ b/graph/incidents_graphml/2/2e61fde0-3e4a-11ee-8b2d-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.192 + 100.64.36.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692419882 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e61fde0-3e4a-11ee-8b2d-bf05437911b6 + + + diff --git a/graph/incidents_graphml/2/2e648e90-4388-11ef-ada3-4f706d22771d.graphml b/graph/incidents_graphml/2/2e648e90-4388-11ef-ada3-4f706d22771d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d44bf37d14fd245225fce3ae09f734686fb9d6c5 --- /dev/null +++ b/graph/incidents_graphml/2/2e648e90-4388-11ef-ada3-4f706d22771d.graphml @@ -0,0 +1,84 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.245 + USER-0015-2144.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + CRED + CRED-0013 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + INCIDENT_LINK + 1721143764 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Unprocessed + 2e648e90-4388-11ef-ada3-4f706d22771d + + + INCIDENT_LINK + 1721143764 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Unprocessed + 2e648e90-4388-11ef-ada3-4f706d22771d + + + diff --git a/graph/incidents_graphml/2/2e6b8f90-ace6-11ed-9c58-3fd78e20bcce.graphml b/graph/incidents_graphml/2/2e6b8f90-ace6-11ed-9c58-3fd78e20bcce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60c039ea0ecbd7d8623b47ae9e70e0e9f9342af4 --- /dev/null +++ b/graph/incidents_graphml/2/2e6b8f90-ace6-11ed-9c58-3fd78e20bcce.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.235.253 + 172.23.235.253 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Windows Active Directory","ASA Firewall","Apache Web Server"] + + + HOST + 100.64.91.138 + 100.64.91.138 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.116.174 + 172.21.116.174 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.88.205 + 100.64.88.205 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.139 + 100.64.91.139 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.140 + 100.64.91.140 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.141 + 100.64.91.141 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.142 + 100.64.91.142 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434013 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6b8f90-ace6-11ed-9c58-3fd78e20bcce + + + diff --git a/graph/incidents_graphml/2/2e6f58e0-3b6c-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/2/2e6f58e0-3b6c-11ee-a7d4-a597d065c4ef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edca07eb52b1b047906621d19f344a882ef5403a --- /dev/null +++ b/graph/incidents_graphml/2/2e6f58e0-3b6c-11ee-a7d4-a597d065c4ef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.170 + 100.64.64.170 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692104631 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e6f58e0-3b6c-11ee-a7d4-a597d065c4ef + + + diff --git a/graph/incidents_graphml/2/2e715bf0-ace6-11ed-9c58-3fd78e20bcce.graphml b/graph/incidents_graphml/2/2e715bf0-ace6-11ed-9c58-3fd78e20bcce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39775b6734f1fac932ac97f67af40c698c2a8df4 --- /dev/null +++ b/graph/incidents_graphml/2/2e715bf0-ace6-11ed-9c58-3fd78e20bcce.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.7.183 + 172.18.7.183 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"] + + + HOST + 100.64.90.108 + 100.64.90.108 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676434014 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e715bf0-ace6-11ed-9c58-3fd78e20bcce + + + INCIDENT_LINK + 1676434014 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e715bf0-ace6-11ed-9c58-3fd78e20bcce + + + diff --git a/graph/incidents_graphml/2/2e718d40-152d-11ef-94b2-9fdc46810273.graphml b/graph/incidents_graphml/2/2e718d40-152d-11ef-94b2-9fdc46810273.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5e5e6df77243038203a43ec01c3fa2bf0363270 --- /dev/null +++ b/graph/incidents_graphml/2/2e718d40-152d-11ef-94b2-9fdc46810273.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.58.162 + USER-0015-2036.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1716046926 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e718d40-152d-11ef-94b2-9fdc46810273 + + + diff --git a/graph/incidents_graphml/2/2e780970-4c99-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/2e780970-4c99-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68d25029a7a41865d132cd9413b71e133751243d --- /dev/null +++ b/graph/incidents_graphml/2/2e780970-4c99-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.16 + 100.64.23.16 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693993128 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e780970-4c99-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/2e7afcc0-4388-11ef-ada3-4f706d22771d.graphml b/graph/incidents_graphml/2/2e7afcc0-4388-11ef-ada3-4f706d22771d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0e2d7c1135d26aa399cd9dd678c16bf71631fde --- /dev/null +++ b/graph/incidents_graphml/2/2e7afcc0-4388-11ef-ada3-4f706d22771d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.245 + USER-0015-2144.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1721143764 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e7afcc0-4388-11ef-ada3-4f706d22771d + + + diff --git a/graph/incidents_graphml/2/2e84a060-a10b-11ee-892c-e7dd0a01bb73.graphml b/graph/incidents_graphml/2/2e84a060-a10b-11ee-892c-e7dd0a01bb73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..094d9e19b74f85613238971003d2147f02cc5363 --- /dev/null +++ b/graph/incidents_graphml/2/2e84a060-a10b-11ee-892c-e7dd0a01bb73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.102 + 100.64.49.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703277989 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e84a060-a10b-11ee-892c-e7dd0a01bb73 + + + diff --git a/graph/incidents_graphml/2/2e84c2d0-44c6-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/2/2e84c2d0-44c6-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1b2b3170842cbece65f99fabc5f800a6d78b5f3 --- /dev/null +++ b/graph/incidents_graphml/2/2e84c2d0-44c6-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.215 + 100.64.49.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693132847 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2e84c2d0-44c6-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/2/2e868860-4c99-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/2e868860-4c99-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2860ee9d937712aac96c51c13e70ab6b371a7d26 --- /dev/null +++ b/graph/incidents_graphml/2/2e868860-4c99-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.16 + 100.64.23.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693993129 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e868860-4c99-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/2e8fa1c0-93b6-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/2/2e8fa1c0-93b6-11ee-ad07-e3190f846a2a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20ea61f550dac0a64849bf025199df05e3f41235 --- /dev/null +++ b/graph/incidents_graphml/2/2e8fa1c0-93b6-11ee-ad07-e3190f846a2a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.78 + 100.64.69.78 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1701812116 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e8fa1c0-93b6-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812116 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2e8fa1c0-93b6-11ee-ad07-e3190f846a2a + + + diff --git a/graph/incidents_graphml/2/2e900040-3b6c-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/2/2e900040-3b6c-11ee-a7d4-a597d065c4ef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26154cf4e55501ddff3b017fb703ffb526355e9a --- /dev/null +++ b/graph/incidents_graphml/2/2e900040-3b6c-11ee-a7d4-a597d065c4ef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.170 + 100.64.64.170 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692104632 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e900040-3b6c-11ee-a7d4-a597d065c4ef + + + diff --git a/graph/incidents_graphml/2/2e931ab0-44c6-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/2/2e931ab0-44c6-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..314390d082c41ef071f3e5b60ba770b4a131a0d0 --- /dev/null +++ b/graph/incidents_graphml/2/2e931ab0-44c6-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.215 + 100.64.49.215 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693132847 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2e931ab0-44c6-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/2/2ea17290-44c6-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/2/2ea17290-44c6-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68a1f45678d2f4e1c12ce849de896eced944307a --- /dev/null +++ b/graph/incidents_graphml/2/2ea17290-44c6-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.90 + 100.64.41.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693132847 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea17290-44c6-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/2/2ea25d60-35a6-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/2/2ea25d60-35a6-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6c7faacaaf0d0da83781283701992407bede5c2 --- /dev/null +++ b/graph/incidents_graphml/2/2ea25d60-35a6-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.223 + 100.64.55.223 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691469836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea25d60-35a6-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/2/2ea6f2e0-0b6c-11ed-bc4c-114b5035f7dd.graphml b/graph/incidents_graphml/2/2ea6f2e0-0b6c-11ed-bc4c-114b5035f7dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3030ef9936be8e0eb24a52c89d8554fee7a465b3 --- /dev/null +++ b/graph/incidents_graphml/2/2ea6f2e0-0b6c-11ed-bc4c-114b5035f7dd.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.177 + 100.64.76.177 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.41 + 100.64.71.41 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.178 + 100.64.76.178 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.14.34 + 100.64.14.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658679478 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ea6f2e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ea6f2e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ea6f2e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ea6f2e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ea6f2e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ea6f2e0-0b6c-11ed-bc4c-114b5035f7dd + + + diff --git a/graph/incidents_graphml/2/2ea963e0-0b6c-11ed-bc4c-114b5035f7dd.graphml b/graph/incidents_graphml/2/2ea963e0-0b6c-11ed-bc4c-114b5035f7dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69ede22d44e3d17e8754e246f539f457a7625b26 --- /dev/null +++ b/graph/incidents_graphml/2/2ea963e0-0b6c-11ed-bc4c-114b5035f7dd.graphml @@ -0,0 +1,409 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.179 + 100.64.76.179 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.15 + 100.64.74.15 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.180 + 100.64.76.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.181 + 100.64.76.181 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.133 + 100.64.72.133 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.182 + 100.64.76.182 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.183 + 100.64.76.183 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.184 + 100.64.76.184 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.185 + 100.64.76.185 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.186 + 100.64.76.186 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.42 + 100.64.72.42 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ea963e0-0b6c-11ed-bc4c-114b5035f7dd + + + diff --git a/graph/incidents_graphml/2/2eb59ae0-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/2/2eb59ae0-6393-11ee-a10b-9345395d0398.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8c2a16065cd4be3da70d18f27622934aa9bdd963 --- /dev/null +++ b/graph/incidents_graphml/2/2eb59ae0-6393-11ee-a10b-9345395d0398.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.184 + 100.64.36.184 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696519429 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2eb59ae0-6393-11ee-a10b-9345395d0398 + + + diff --git a/graph/incidents_graphml/2/2eb71d70-44c6-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/2/2eb71d70-44c6-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac5d95037d6dc064ad6be56411d18bf9e6d7c05d --- /dev/null +++ b/graph/incidents_graphml/2/2eb71d70-44c6-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.90 + 100.64.41.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693132847 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2eb71d70-44c6-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/2/2ec3c810-35a6-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/2/2ec3c810-35a6-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6b364a8882600a39a5bf58b6aa6f38970b7314f --- /dev/null +++ b/graph/incidents_graphml/2/2ec3c810-35a6-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.223 + 100.64.55.223 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691469836 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2ec3c810-35a6-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/2/2ec5ee90-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/2/2ec5ee90-6393-11ee-a10b-9345395d0398.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ca56a8499959c7babf98d0d8adfc77f53c98fa3 --- /dev/null +++ b/graph/incidents_graphml/2/2ec5ee90-6393-11ee-a10b-9345395d0398.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.184 + 100.64.36.184 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696519429 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2ec5ee90-6393-11ee-a10b-9345395d0398 + + + diff --git a/graph/incidents_graphml/2/2ec99350-7b95-11ee-9581-a3221813a5fb.graphml b/graph/incidents_graphml/2/2ec99350-7b95-11ee-9581-a3221813a5fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fec0031df0dca268f0b4f16f1fa00963d21d25f0 --- /dev/null +++ b/graph/incidents_graphml/2/2ec99350-7b95-11ee-9581-a3221813a5fb.graphml @@ -0,0 +1,825 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.120 + 100.64.48.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.146 + 100.64.8.146 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.250 + 100.64.22.250 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.241 + 100.64.11.241 + ["Exploiting Host"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.196 + 100.64.24.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.57 + 100.64.28.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.180 + 100.64.38.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.161 + 100.64.33.161 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.121 + 100.64.48.121 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.119 + 100.64.11.119 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.123 + 100.64.40.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.201 + 100.64.16.201 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.122 + 100.64.48.122 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.38 + 100.64.32.38 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + INCIDENT_LINK + 1699159116 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ec99350-7b95-11ee-9581-a3221813a5fb + + + diff --git a/graph/incidents_graphml/2/2ecd8990-4388-11ef-ada3-4f706d22771d.graphml b/graph/incidents_graphml/2/2ecd8990-4388-11ef-ada3-4f706d22771d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b2be62e8dbcc7c22ba54438d4f1c5fa1ac94dae --- /dev/null +++ b/graph/incidents_graphml/2/2ecd8990-4388-11ef-ada3-4f706d22771d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.246 + 100.64.95.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1721143765 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ecd8990-4388-11ef-ada3-4f706d22771d + + + diff --git a/graph/incidents_graphml/2/2ed13970-544e-11ee-862a-9bdfc30b143b.graphml b/graph/incidents_graphml/2/2ed13970-544e-11ee-862a-9bdfc30b143b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..720c6de6ca7055b007e37df675613db7a8cbb089 --- /dev/null +++ b/graph/incidents_graphml/2/2ed13970-544e-11ee-862a-9bdfc30b143b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.109 + 100.64.62.109 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694840526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2ed13970-544e-11ee-862a-9bdfc30b143b + + + diff --git a/graph/incidents_graphml/2/2edde850-9eb8-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/2/2edde850-9eb8-11ee-9861-037a800baf91.graphml new file mode 100644 index 0000000000000000000000000000000000000000..194e9d1e3b636cbfb78152b67c1fc635c420dd06 --- /dev/null +++ b/graph/incidents_graphml/2/2edde850-9eb8-11ee-9861-037a800baf91.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.70 + 100.64.25.70 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.120.151.164 + 10.120.151.164 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703022439 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2edde850-9eb8-11ee-9861-037a800baf91 + + + INCIDENT_LINK + 1703022439 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2edde850-9eb8-11ee-9861-037a800baf91 + + + diff --git a/graph/incidents_graphml/2/2ee668c0-4388-11ef-ada3-4f706d22771d.graphml b/graph/incidents_graphml/2/2ee668c0-4388-11ef-ada3-4f706d22771d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..345ab4980ad4023310a0e00dd4a75e87efb405b8 --- /dev/null +++ b/graph/incidents_graphml/2/2ee668c0-4388-11ef-ada3-4f706d22771d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.246 + 100.64.95.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721143765 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ee668c0-4388-11ef-ada3-4f706d22771d + + + diff --git a/graph/incidents_graphml/2/2ee99630-1602-11ee-b5b0-23eb7b8b596d.graphml b/graph/incidents_graphml/2/2ee99630-1602-11ee-b5b0-23eb7b8b596d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbcc5795b798a8e450607f0aa1ee1e0b94192c5e --- /dev/null +++ b/graph/incidents_graphml/2/2ee99630-1602-11ee-b5b0-23eb7b8b596d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.201 + 100.64.13.201 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687990912 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ee99630-1602-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990912 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2ee99630-1602-11ee-b5b0-23eb7b8b596d + + + diff --git a/graph/incidents_graphml/2/2ef2f240-152d-11ef-94b2-9fdc46810273.graphml b/graph/incidents_graphml/2/2ef2f240-152d-11ef-94b2-9fdc46810273.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51716b9b0798cbde95d2049c876e2d3f29c638dd --- /dev/null +++ b/graph/incidents_graphml/2/2ef2f240-152d-11ef-94b2-9fdc46810273.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.67 + 100.64.80.67 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1716046927 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2ef2f240-152d-11ef-94b2-9fdc46810273 + + + diff --git a/graph/incidents_graphml/2/2efba5d0-3e4a-11ee-8b2d-bf05437911b6.graphml b/graph/incidents_graphml/2/2efba5d0-3e4a-11ee-8b2d-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fdf50374aeed0d5176ff135acb4f459394cb4839 --- /dev/null +++ b/graph/incidents_graphml/2/2efba5d0-3e4a-11ee-8b2d-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.194 + 100.64.36.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692419883 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2efba5d0-3e4a-11ee-8b2d-bf05437911b6 + + + diff --git a/graph/incidents_graphml/2/2efc65e0-0b6c-11ed-bc4c-114b5035f7dd.graphml b/graph/incidents_graphml/2/2efc65e0-0b6c-11ed-bc4c-114b5035f7dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2dee40c6874e3ce340e6af2173824947dde0a79 --- /dev/null +++ b/graph/incidents_graphml/2/2efc65e0-0b6c-11ed-bc4c-114b5035f7dd.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.187 + 100.64.76.187 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.92 + USER-0015-1614.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.188 + 100.64.76.188 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.3.149 + 100.64.3.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.38 + USER-0015-1740.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658679479 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2efc65e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679479 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2efc65e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679479 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2efc65e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679479 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2efc65e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679479 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2efc65e0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679479 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2efc65e0-0b6c-11ed-bc4c-114b5035f7dd + + + diff --git a/graph/incidents_graphml/2/2f0666c0-4c99-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/2f0666c0-4c99-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..adbcf57a4e9dfb187c07483169634074d9269a38 --- /dev/null +++ b/graph/incidents_graphml/2/2f0666c0-4c99-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.81 + 100.64.27.81 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693993129 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2f0666c0-4c99-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/2f07dad0-718f-11ee-9fe3-bf96143a208f.graphml b/graph/incidents_graphml/2/2f07dad0-718f-11ee-9fe3-bf96143a208f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8c4f62aabb1e8318478c88b18fe7dd5ce83664d7 --- /dev/null +++ b/graph/incidents_graphml/2/2f07dad0-718f-11ee-9fe3-bf96143a208f.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.112 + 100.64.68.112 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"] + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1698057027 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2f07dad0-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057027 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2f07dad0-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057027 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2f07dad0-718f-11ee-9fe3-bf96143a208f + + + INCIDENT_LINK + 1698057027 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 2f07dad0-718f-11ee-9fe3-bf96143a208f + + + diff --git a/graph/incidents_graphml/2/2f082840-a10b-11ee-892c-e7dd0a01bb73.graphml b/graph/incidents_graphml/2/2f082840-a10b-11ee-892c-e7dd0a01bb73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78427eb7cf0a68c586bf06d7e1c60abed360b3d4 --- /dev/null +++ b/graph/incidents_graphml/2/2f082840-a10b-11ee-892c-e7dd0a01bb73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.142 + 100.64.48.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703277990 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f082840-a10b-11ee-892c-e7dd0a01bb73 + + + diff --git a/graph/incidents_graphml/2/2f0ce3e0-3e4a-11ee-8b2d-bf05437911b6.graphml b/graph/incidents_graphml/2/2f0ce3e0-3e4a-11ee-8b2d-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f711afb1191c934249d5ea1af67b16860e7b99e --- /dev/null +++ b/graph/incidents_graphml/2/2f0ce3e0-3e4a-11ee-8b2d-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.194 + 100.64.36.194 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692419883 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2f0ce3e0-3e4a-11ee-8b2d-bf05437911b6 + + + diff --git a/graph/incidents_graphml/2/2f121300-152d-11ef-94b2-9fdc46810273.graphml b/graph/incidents_graphml/2/2f121300-152d-11ef-94b2-9fdc46810273.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab962b6f52b3260c35e96358bd6e83c787457f6c --- /dev/null +++ b/graph/incidents_graphml/2/2f121300-152d-11ef-94b2-9fdc46810273.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.80.67 + 100.64.80.67 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716046928 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2f121300-152d-11ef-94b2-9fdc46810273 + + + diff --git a/graph/incidents_graphml/2/2f1599b0-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/2/2f1599b0-0c5d-11ed-b597-112eae6df069.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50b4418db5f5f1ff400e7d09d2b60a7ffaa89b35 --- /dev/null +++ b/graph/incidents_graphml/2/2f1599b0-0c5d-11ed-b597-112eae6df069.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.26 + 100.64.7.26 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.111 + 100.64.71.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658782987 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2f1599b0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658782987 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2f1599b0-0c5d-11ed-b597-112eae6df069 + + + diff --git a/graph/incidents_graphml/2/2f1a7590-aac0-11ee-a834-01ba9434432f.graphml b/graph/incidents_graphml/2/2f1a7590-aac0-11ee-a834-01ba9434432f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f7181a3144c3192b73dddf3a8e447f5f32eb10a --- /dev/null +++ b/graph/incidents_graphml/2/2f1a7590-aac0-11ee-a834-01ba9434432f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.166 + 100.64.42.166 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704345289 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f1a7590-aac0-11ee-a834-01ba9434432f + + + diff --git a/graph/incidents_graphml/2/2f1d1080-3e4a-11ee-8b2d-bf05437911b6.graphml b/graph/incidents_graphml/2/2f1d1080-3e4a-11ee-8b2d-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f5ac28ad0a20145c5b06082f4ff8490a302b4bb --- /dev/null +++ b/graph/incidents_graphml/2/2f1d1080-3e4a-11ee-8b2d-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.196 + 100.64.36.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692419883 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f1d1080-3e4a-11ee-8b2d-bf05437911b6 + + + diff --git a/graph/incidents_graphml/2/2f27ab00-4c44-11ee-b1bc-8d691f441630.graphml b/graph/incidents_graphml/2/2f27ab00-4c44-11ee-b1bc-8d691f441630.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2d40b64850bee9e6d4969e8b1a180292ad5d161 --- /dev/null +++ b/graph/incidents_graphml/2/2f27ab00-4c44-11ee-b1bc-8d691f441630.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.99 + 100.64.56.99 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693956622 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2f27ab00-4c44-11ee-b1bc-8d691f441630 + + + diff --git a/graph/incidents_graphml/2/2f2e0070-3e4a-11ee-8b2d-bf05437911b6.graphml b/graph/incidents_graphml/2/2f2e0070-3e4a-11ee-8b2d-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a66b16229ccc997e0ff490100b32e81f88c5426b --- /dev/null +++ b/graph/incidents_graphml/2/2f2e0070-3e4a-11ee-8b2d-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.196 + 100.64.36.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692419883 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2f2e0070-3e4a-11ee-8b2d-bf05437911b6 + + + diff --git a/graph/incidents_graphml/2/2f3179d0-dbb1-11ee-a665-15e5a5884e11.graphml b/graph/incidents_graphml/2/2f3179d0-dbb1-11ee-a665-15e5a5884e11.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c1142cfa176b16e55d5820ca99c72a5f6e13cb5 --- /dev/null +++ b/graph/incidents_graphml/2/2f3179d0-dbb1-11ee-a665-15e5a5884e11.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.67 + 100.64.23.67 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.223 + USER-0015-1391.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.224 + 100.64.50.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.225 + 100.64.50.225 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.226 + 100.64.50.226 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.227 + 100.64.50.227 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.202 + 100.64.10.202 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.232 + 100.64.48.232 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f3179d0-dbb1-11ee-a665-15e5a5884e11 + + + diff --git a/graph/incidents_graphml/2/2f373b60-4c44-11ee-b1bc-8d691f441630.graphml b/graph/incidents_graphml/2/2f373b60-4c44-11ee-b1bc-8d691f441630.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7d2d9ad448b97a6314789b0fa73087cd234859a --- /dev/null +++ b/graph/incidents_graphml/2/2f373b60-4c44-11ee-b1bc-8d691f441630.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.76 + 100.64.7.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693956622 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f373b60-4c44-11ee-b1bc-8d691f441630 + + + diff --git a/graph/incidents_graphml/2/2f404ef0-152d-11ef-94b2-9fdc46810273.graphml b/graph/incidents_graphml/2/2f404ef0-152d-11ef-94b2-9fdc46810273.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8bfdbe05720b88d6d1cc40045ffbfcf8196ff924 --- /dev/null +++ b/graph/incidents_graphml/2/2f404ef0-152d-11ef-94b2-9fdc46810273.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.125 + USER-0015-2037.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1716046928 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f404ef0-152d-11ef-94b2-9fdc46810273 + + + diff --git a/graph/incidents_graphml/2/2f456f70-4431-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/2/2f456f70-4431-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5945aad27fdbd4b6abc3c974f49a973fc04097e3 --- /dev/null +++ b/graph/incidents_graphml/2/2f456f70-4431-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.23 + 100.64.47.23 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693068853 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2f456f70-4431-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/2/2f4700b0-6a7e-11ee-a921-9b336567fa61.graphml b/graph/incidents_graphml/2/2f4700b0-6a7e-11ee-a921-9b336567fa61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d7abac15f61751c4333fa956ba09d20d8c09921 --- /dev/null +++ b/graph/incidents_graphml/2/2f4700b0-6a7e-11ee-a921-9b336567fa61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.18 + 100.64.18.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697280068 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2f4700b0-6a7e-11ee-a921-9b336567fa61 + + + diff --git a/graph/incidents_graphml/2/2f54add0-4c99-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/2f54add0-4c99-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfd4b5f4b471a8f5dc307ccb72924bdf42cd0c47 --- /dev/null +++ b/graph/incidents_graphml/2/2f54add0-4c99-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.83 + 100.64.27.83 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693993130 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f54add0-4c99-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/2f5d4cd0-152d-11ef-94b2-9fdc46810273.graphml b/graph/incidents_graphml/2/2f5d4cd0-152d-11ef-94b2-9fdc46810273.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d110bcaf5f2ecaf7d8addedabd71a8fa65719df --- /dev/null +++ b/graph/incidents_graphml/2/2f5d4cd0-152d-11ef-94b2-9fdc46810273.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.47.125 + USER-0015-2037.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1716046928 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2f5d4cd0-152d-11ef-94b2-9fdc46810273 + + + diff --git a/graph/incidents_graphml/2/2f632cc0-4c99-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/2f632cc0-4c99-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..540f6b2da503c95a7b6cd846354135d0f381e7f6 --- /dev/null +++ b/graph/incidents_graphml/2/2f632cc0-4c99-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.83 + 100.64.27.83 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693993130 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2f632cc0-4c99-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/2f6cc2a0-772b-11ee-979b-2388a139fa0e.graphml b/graph/incidents_graphml/2/2f6cc2a0-772b-11ee-979b-2388a139fa0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7cc93f2c4817a807e216ee8a9845901cf2ff3bc4 --- /dev/null +++ b/graph/incidents_graphml/2/2f6cc2a0-772b-11ee-979b-2388a139fa0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.208 + 100.64.8.208 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698673785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f6cc2a0-772b-11ee-979b-2388a139fa0e + + + diff --git a/graph/incidents_graphml/2/2f6ec780-3b6c-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/2/2f6ec780-3b6c-11ee-a7d4-a597d065c4ef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8f05fb119ee8753d7fb05ecbc92169c550bb4fa --- /dev/null +++ b/graph/incidents_graphml/2/2f6ec780-3b6c-11ee-a7d4-a597d065c4ef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.252 + 100.64.36.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692104633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f6ec780-3b6c-11ee-a7d4-a597d065c4ef + + + diff --git a/graph/incidents_graphml/2/2f6f88d0-4c99-11ee-82ee-d76cd040b93d.graphml b/graph/incidents_graphml/2/2f6f88d0-4c99-11ee-82ee-d76cd040b93d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c0ed56458c543652f81e70831d0aa42ff86cf88 --- /dev/null +++ b/graph/incidents_graphml/2/2f6f88d0-4c99-11ee-82ee-d76cd040b93d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.85 + 100.64.27.85 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693993130 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f6f88d0-4c99-11ee-82ee-d76cd040b93d + + + diff --git a/graph/incidents_graphml/2/2f7ca120-772b-11ee-979b-2388a139fa0e.graphml b/graph/incidents_graphml/2/2f7ca120-772b-11ee-979b-2388a139fa0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..beb405004415ca2cfe06c10a5aa77f8cc754d1ca --- /dev/null +++ b/graph/incidents_graphml/2/2f7ca120-772b-11ee-979b-2388a139fa0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.208 + 100.64.8.208 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698673785 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2f7ca120-772b-11ee-979b-2388a139fa0e + + + diff --git a/graph/incidents_graphml/2/2f895460-3b6c-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/2/2f895460-3b6c-11ee-a7d4-a597d065c4ef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9f731ccd008e304d9b38f22c3a42ad36672771a --- /dev/null +++ b/graph/incidents_graphml/2/2f895460-3b6c-11ee-a7d4-a597d065c4ef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.252 + 100.64.36.252 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692104633 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2f895460-3b6c-11ee-a7d4-a597d065c4ef + + + diff --git a/graph/incidents_graphml/2/2f8d6a00-772b-11ee-979b-2388a139fa0e.graphml b/graph/incidents_graphml/2/2f8d6a00-772b-11ee-979b-2388a139fa0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c35c984a8692fbfe7b6acd68b8c919878da0f63 --- /dev/null +++ b/graph/incidents_graphml/2/2f8d6a00-772b-11ee-979b-2388a139fa0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.97 + 100.64.42.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698673786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f8d6a00-772b-11ee-979b-2388a139fa0e + + + diff --git a/graph/incidents_graphml/2/2f980ce0-3e4a-11ee-8b2d-bf05437911b6.graphml b/graph/incidents_graphml/2/2f980ce0-3e4a-11ee-8b2d-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7e1eb6483e883ed174751bb783fe822eea4221f --- /dev/null +++ b/graph/incidents_graphml/2/2f980ce0-3e4a-11ee-8b2d-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.198 + 100.64.36.198 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692419884 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2f980ce0-3e4a-11ee-8b2d-bf05437911b6 + + + diff --git a/graph/incidents_graphml/2/2f9e8100-772b-11ee-979b-2388a139fa0e.graphml b/graph/incidents_graphml/2/2f9e8100-772b-11ee-979b-2388a139fa0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad6415b363172ed785fb4fa5eea4274b4b3bfff3 --- /dev/null +++ b/graph/incidents_graphml/2/2f9e8100-772b-11ee-979b-2388a139fa0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.97 + 100.64.42.97 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698673786 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2f9e8100-772b-11ee-979b-2388a139fa0e + + + diff --git a/graph/incidents_graphml/2/2fa48ec0-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/2/2fa48ec0-6393-11ee-a10b-9345395d0398.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b10a6e9211072efe3daea998677c217264cd66bb --- /dev/null +++ b/graph/incidents_graphml/2/2fa48ec0-6393-11ee-a10b-9345395d0398.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.186 + 100.64.36.186 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696519430 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fa48ec0-6393-11ee-a10b-9345395d0398 + + + INCIDENT_LINK + 1696519430 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fa48ec0-6393-11ee-a10b-9345395d0398 + + + diff --git a/graph/incidents_graphml/2/2fa637b0-6a7e-11ee-a921-9b336567fa61.graphml b/graph/incidents_graphml/2/2fa637b0-6a7e-11ee-a921-9b336567fa61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b91b92d72df1a10007eff0553c996f5dcf6cc86e --- /dev/null +++ b/graph/incidents_graphml/2/2fa637b0-6a7e-11ee-a921-9b336567fa61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.20 + 100.64.18.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697280069 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fa637b0-6a7e-11ee-a921-9b336567fa61 + + + diff --git a/graph/incidents_graphml/2/2faaf8a0-3e4a-11ee-8b2d-bf05437911b6.graphml b/graph/incidents_graphml/2/2faaf8a0-3e4a-11ee-8b2d-bf05437911b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ea5f0ad69deb7d5d3f6f4fc587596f5147ef8fe --- /dev/null +++ b/graph/incidents_graphml/2/2faaf8a0-3e4a-11ee-8b2d-bf05437911b6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.198 + 100.64.36.198 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692419884 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2faaf8a0-3e4a-11ee-8b2d-bf05437911b6 + + + diff --git a/graph/incidents_graphml/2/2fac95b0-4431-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/2/2fac95b0-4431-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ee307f0fc4b8fe0bb698de346d18d968e2b7c59 --- /dev/null +++ b/graph/incidents_graphml/2/2fac95b0-4431-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.31 + 100.64.29.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693068854 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fac95b0-4431-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/2/2fae4020-4c44-11ee-b1bc-8d691f441630.graphml b/graph/incidents_graphml/2/2fae4020-4c44-11ee-b1bc-8d691f441630.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b69595c0ad2789a5b10019d203a05af8a9882c5 --- /dev/null +++ b/graph/incidents_graphml/2/2fae4020-4c44-11ee-b1bc-8d691f441630.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.153 + 100.64.7.153 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693956623 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fae4020-4c44-11ee-b1bc-8d691f441630 + + + diff --git a/graph/incidents_graphml/2/2fb50980-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/2/2fb50980-6393-11ee-a10b-9345395d0398.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a05a92b99dabc7e87bfcb8d0b257b1bb0846dad --- /dev/null +++ b/graph/incidents_graphml/2/2fb50980-6393-11ee-a10b-9345395d0398.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.186 + 100.64.36.186 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696519430 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2fb50980-6393-11ee-a10b-9345395d0398 + + + diff --git a/graph/incidents_graphml/2/2fb52ef0-aac0-11ee-a834-01ba9434432f.graphml b/graph/incidents_graphml/2/2fb52ef0-aac0-11ee-a834-01ba9434432f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c07b1f9ea3a76f534e734b6963c4f6920b57d8d --- /dev/null +++ b/graph/incidents_graphml/2/2fb52ef0-aac0-11ee-a834-01ba9434432f.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.157 + 100.64.66.157 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704345290 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2fb52ef0-aac0-11ee-a834-01ba9434432f + + + INCIDENT_LINK + 1704345290 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2fb52ef0-aac0-11ee-a834-01ba9434432f + + + diff --git a/graph/incidents_graphml/2/2fb579f0-6a7e-11ee-a921-9b336567fa61.graphml b/graph/incidents_graphml/2/2fb579f0-6a7e-11ee-a921-9b336567fa61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94e71551e96acf362bee127dce658de0c8120b2d --- /dev/null +++ b/graph/incidents_graphml/2/2fb579f0-6a7e-11ee-a921-9b336567fa61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.20 + 100.64.18.20 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697280069 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2fb579f0-6a7e-11ee-a921-9b336567fa61 + + + diff --git a/graph/incidents_graphml/2/2fb84590-299b-11ef-bcba-e72095bb0d10.graphml b/graph/incidents_graphml/2/2fb84590-299b-11ef-bcba-e72095bb0d10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2eff7f9ed22579e7a5e4c59683604e28a29191e1 --- /dev/null +++ b/graph/incidents_graphml/2/2fb84590-299b-11ef-bcba-e72095bb0d10.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.210 + 100.64.21.210 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718293197 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fb84590-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293197 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fb84590-299b-11ef-bcba-e72095bb0d10 + + + diff --git a/graph/incidents_graphml/2/2fbe93d0-4c44-11ee-b1bc-8d691f441630.graphml b/graph/incidents_graphml/2/2fbe93d0-4c44-11ee-b1bc-8d691f441630.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d351b01e6a7a37b0273314ed567f166e288639ba --- /dev/null +++ b/graph/incidents_graphml/2/2fbe93d0-4c44-11ee-b1bc-8d691f441630.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.153 + 100.64.7.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693956623 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2fbe93d0-4c44-11ee-b1bc-8d691f441630 + + + diff --git a/graph/incidents_graphml/2/2fc32af0-4431-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/2/2fc32af0-4431-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56a96fe4efcf0b43caf5702fe3d1617d73685d24 --- /dev/null +++ b/graph/incidents_graphml/2/2fc32af0-4431-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.31 + 100.64.29.31 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693068854 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2fc32af0-4431-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/2/2fccdcf0-9cdb-11ee-b9dc-b9fde04d3fe1.graphml b/graph/incidents_graphml/2/2fccdcf0-9cdb-11ee-b9dc-b9fde04d3fe1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7a963e412112c6847c274c567e65db02a196ff6 --- /dev/null +++ b/graph/incidents_graphml/2/2fccdcf0-9cdb-11ee-b9dc-b9fde04d3fe1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.88.147 + 100.64.88.147 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702817570 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2fccdcf0-9cdb-11ee-b9dc-b9fde04d3fe1 + + + diff --git a/graph/incidents_graphml/2/2fccebb0-4c44-11ee-b1bc-8d691f441630.graphml b/graph/incidents_graphml/2/2fccebb0-4c44-11ee-b1bc-8d691f441630.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfead03eeac49fd87d419df0e94157fa88656603 --- /dev/null +++ b/graph/incidents_graphml/2/2fccebb0-4c44-11ee-b1bc-8d691f441630.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.101 + 100.64.56.101 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693956623 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fccebb0-4c44-11ee-b1bc-8d691f441630 + + + diff --git a/graph/incidents_graphml/2/2fd40370-544e-11ee-862a-9bdfc30b143b.graphml b/graph/incidents_graphml/2/2fd40370-544e-11ee-862a-9bdfc30b143b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..631e91337e23472c71f9b7661d2d507cf55010db --- /dev/null +++ b/graph/incidents_graphml/2/2fd40370-544e-11ee-862a-9bdfc30b143b.graphml @@ -0,0 +1,217 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.111 + 100.64.62.111 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694840528 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fd40370-544e-11ee-862a-9bdfc30b143b + + + INCIDENT_LINK + 1694840528 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fd40370-544e-11ee-862a-9bdfc30b143b + + + INCIDENT_LINK + 1694840528 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fd40370-544e-11ee-862a-9bdfc30b143b + + + INCIDENT_LINK + 1694840528 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fd40370-544e-11ee-862a-9bdfc30b143b + + + INCIDENT_LINK + 1694840528 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fd40370-544e-11ee-862a-9bdfc30b143b + + + INCIDENT_LINK + 1694840528 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fd40370-544e-11ee-862a-9bdfc30b143b + + + INCIDENT_LINK + 1694840528 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fd40370-544e-11ee-862a-9bdfc30b143b + + + INCIDENT_LINK + 1694840528 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fd40370-544e-11ee-862a-9bdfc30b143b + + + diff --git a/graph/incidents_graphml/2/2fdb34d0-9cdb-11ee-b9dc-b9fde04d3fe1.graphml b/graph/incidents_graphml/2/2fdb34d0-9cdb-11ee-b9dc-b9fde04d3fe1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8f2db36d02218172bba374e1c8f6a5e29cbf552 --- /dev/null +++ b/graph/incidents_graphml/2/2fdb34d0-9cdb-11ee-b9dc-b9fde04d3fe1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.151 + 100.64.88.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1702817571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 2fdb34d0-9cdb-11ee-b9dc-b9fde04d3fe1 + + + diff --git a/graph/incidents_graphml/2/2fe73d50-544e-11ee-862a-9bdfc30b143b.graphml b/graph/incidents_graphml/2/2fe73d50-544e-11ee-862a-9bdfc30b143b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df6f92ec4296bb45ac61a809f7b8a6d8b0762482 --- /dev/null +++ b/graph/incidents_graphml/2/2fe73d50-544e-11ee-862a-9bdfc30b143b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.111 + 100.64.62.111 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694840528 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 2fe73d50-544e-11ee-862a-9bdfc30b143b + + + diff --git a/graph/incidents_graphml/2/2febaf90-9cdb-11ee-b9dc-b9fde04d3fe1.graphml b/graph/incidents_graphml/2/2febaf90-9cdb-11ee-b9dc-b9fde04d3fe1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8ae490ced6700e1e59e1f9552de95dadb5a38bd --- /dev/null +++ b/graph/incidents_graphml/2/2febaf90-9cdb-11ee-b9dc-b9fde04d3fe1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.88.151 + 100.64.88.151 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702817571 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2febaf90-9cdb-11ee-b9dc-b9fde04d3fe1 + + + diff --git a/graph/incidents_graphml/2/2ff9cb50-4431-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/2/2ff9cb50-4431-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72ff2891bff045651f8c5e276cee21ad94ec22df --- /dev/null +++ b/graph/incidents_graphml/2/2ff9cb50-4431-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.252 + 100.64.36.252 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693068854 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2ff9cb50-4431-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/2/2fff1080-9cdb-11ee-b9dc-b9fde04d3fe1.graphml b/graph/incidents_graphml/2/2fff1080-9cdb-11ee-b9dc-b9fde04d3fe1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36ffe6a2983982ae9e3c24303d5c56bccb04bac2 --- /dev/null +++ b/graph/incidents_graphml/2/2fff1080-9cdb-11ee-b9dc-b9fde04d3fe1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.88.153 + 100.64.88.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702817571 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 2fff1080-9cdb-11ee-b9dc-b9fde04d3fe1 + + + diff --git a/graph/incidents_graphml/3/30141770-0b6c-11ed-bc4c-114b5035f7dd.graphml b/graph/incidents_graphml/3/30141770-0b6c-11ed-bc4c-114b5035f7dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9d0938967c1d3b83e85c97d05bcb1aa998b37c4 --- /dev/null +++ b/graph/incidents_graphml/3/30141770-0b6c-11ed-bc4c-114b5035f7dd.graphml @@ -0,0 +1,373 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.189 + 100.64.76.189 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.190 + 100.64.76.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.191 + 100.64.76.191 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.51 + 100.64.72.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.255 + 100.64.70.255 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.116 + USER-0015-1741.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.21 + 100.64.73.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.192 + 100.64.76.192 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.77 + 100.64.73.77 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.58 + USER-0015-1742.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679480 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30141770-0b6c-11ed-bc4c-114b5035f7dd + + + diff --git a/graph/incidents_graphml/3/301e9d20-35a6-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/3/301e9d20-35a6-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9814450ac0ecf3d2dbfe6971c1969b6a9ed6cced --- /dev/null +++ b/graph/incidents_graphml/3/301e9d20-35a6-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.174 + 100.64.13.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691469838 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 301e9d20-35a6-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/3/302228e0-9cdb-11ee-b9dc-b9fde04d3fe1.graphml b/graph/incidents_graphml/3/302228e0-9cdb-11ee-b9dc-b9fde04d3fe1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ef2171d1fc35e9638c2d08755620050488fb8f4 --- /dev/null +++ b/graph/incidents_graphml/3/302228e0-9cdb-11ee-b9dc-b9fde04d3fe1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.217 + 100.64.5.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1702817571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 302228e0-9cdb-11ee-b9dc-b9fde04d3fe1 + + + diff --git a/graph/incidents_graphml/3/302b49f0-6f7a-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/3/302b49f0-6f7a-11ed-88c8-935f200141c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7583edeca4de2e82cdf6d9be0473a464dd78b724 --- /dev/null +++ b/graph/incidents_graphml/3/302b49f0-6f7a-11ed-88c8-935f200141c8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.237 + 100.64.79.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.104 + 100.64.72.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1669680610 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 302b49f0-6f7a-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669680610 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 302b49f0-6f7a-11ed-88c8-935f200141c8 + + + diff --git a/graph/incidents_graphml/3/302d6cd0-6f7a-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/3/302d6cd0-6f7a-11ed-88c8-935f200141c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1e01372041c9656c1343823b413eab22e9e6239 --- /dev/null +++ b/graph/incidents_graphml/3/302d6cd0-6f7a-11ed-88c8-935f200141c8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.238 + 100.64.79.238 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.201 + 100.64.76.201 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1669680610 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 302d6cd0-6f7a-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669680610 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 302d6cd0-6f7a-11ed-88c8-935f200141c8 + + + diff --git a/graph/incidents_graphml/3/30316b20-9cdb-11ee-b9dc-b9fde04d3fe1.graphml b/graph/incidents_graphml/3/30316b20-9cdb-11ee-b9dc-b9fde04d3fe1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d95716364b61054634674bbf52aa492058585007 --- /dev/null +++ b/graph/incidents_graphml/3/30316b20-9cdb-11ee-b9dc-b9fde04d3fe1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.5.217 + 100.64.5.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702817571 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 30316b20-9cdb-11ee-b9dc-b9fde04d3fe1 + + + diff --git a/graph/incidents_graphml/3/303f74e0-9cdb-11ee-b9dc-b9fde04d3fe1.graphml b/graph/incidents_graphml/3/303f74e0-9cdb-11ee-b9dc-b9fde04d3fe1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f076f51746aac106fa68942843b4b8ef0b85541 --- /dev/null +++ b/graph/incidents_graphml/3/303f74e0-9cdb-11ee-b9dc-b9fde04d3fe1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.154 + 100.64.88.154 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1702817571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 303f74e0-9cdb-11ee-b9dc-b9fde04d3fe1 + + + diff --git a/graph/incidents_graphml/3/303f8be0-3ca7-11ee-874c-c948d9dda210.graphml b/graph/incidents_graphml/3/303f8be0-3ca7-11ee-874c-c948d9dda210.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df3817a5f2fb5a15ba071a375a283266c42fa462 --- /dev/null +++ b/graph/incidents_graphml/3/303f8be0-3ca7-11ee-874c-c948d9dda210.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.225 + 100.64.29.225 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692239926 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 303f8be0-3ca7-11ee-874c-c948d9dda210 + + + diff --git a/graph/incidents_graphml/3/3042b040-772b-11ee-979b-2388a139fa0e.graphml b/graph/incidents_graphml/3/3042b040-772b-11ee-979b-2388a139fa0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7015d3626c607fcc9f3859f70497ff4205964808 --- /dev/null +++ b/graph/incidents_graphml/3/3042b040-772b-11ee-979b-2388a139fa0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.100 + 100.64.38.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698673787 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3042b040-772b-11ee-979b-2388a139fa0e + + + diff --git a/graph/incidents_graphml/3/3044c2c0-35a6-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/3/3044c2c0-35a6-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c616dede308c258d731bb03634ab0afc03e6b5ce --- /dev/null +++ b/graph/incidents_graphml/3/3044c2c0-35a6-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.225 + 100.64.55.225 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691469838 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3044c2c0-35a6-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/3/304f7a70-9cdb-11ee-b9dc-b9fde04d3fe1.graphml b/graph/incidents_graphml/3/304f7a70-9cdb-11ee-b9dc-b9fde04d3fe1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7d75cd62ae9c9a51670e613f49e0f5ecfb21eae --- /dev/null +++ b/graph/incidents_graphml/3/304f7a70-9cdb-11ee-b9dc-b9fde04d3fe1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.88.154 + 100.64.88.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702817571 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 304f7a70-9cdb-11ee-b9dc-b9fde04d3fe1 + + + diff --git a/graph/incidents_graphml/3/3050e110-772b-11ee-979b-2388a139fa0e.graphml b/graph/incidents_graphml/3/3050e110-772b-11ee-979b-2388a139fa0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42a89b19522579e49c5fa1ed8aa8a885e61d06f8 --- /dev/null +++ b/graph/incidents_graphml/3/3050e110-772b-11ee-979b-2388a139fa0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.100 + 100.64.38.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698673787 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3050e110-772b-11ee-979b-2388a139fa0e + + + diff --git a/graph/incidents_graphml/3/3055a3b0-4c44-11ee-b1bc-8d691f441630.graphml b/graph/incidents_graphml/3/3055a3b0-4c44-11ee-b1bc-8d691f441630.graphml new file mode 100644 index 0000000000000000000000000000000000000000..579392ac198acd6c353c49b931a353c0125d8b81 --- /dev/null +++ b/graph/incidents_graphml/3/3055a3b0-4c44-11ee-b1bc-8d691f441630.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.149 + 100.64.9.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693956624 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3055a3b0-4c44-11ee-b1bc-8d691f441630 + + + diff --git a/graph/incidents_graphml/3/3058bbc0-dbb1-11ee-a665-15e5a5884e11.graphml b/graph/incidents_graphml/3/3058bbc0-dbb1-11ee-a665-15e5a5884e11.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61c3c63e57d14adcbfd0b851fb5d05d794ec60de --- /dev/null +++ b/graph/incidents_graphml/3/3058bbc0-dbb1-11ee-a665-15e5a5884e11.graphml @@ -0,0 +1,429 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.7 + 100.64.22.7 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.44 + 100.64.10.44 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.233 + 100.64.50.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.234 + 100.64.50.234 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.235 + 100.64.50.235 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.236 + 100.64.50.236 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.153 + 100.64.8.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.237 + 100.64.50.237 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.31 + 100.64.28.31 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.225 + 100.64.4.225 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726456 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3058bbc0-dbb1-11ee-a665-15e5a5884e11 + + + diff --git a/graph/incidents_graphml/3/305ea7a0-4431-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/3/305ea7a0-4431-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32fda12121b11d6a6e0eaaf436a57538367e9889 --- /dev/null +++ b/graph/incidents_graphml/3/305ea7a0-4431-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.117 + 100.64.29.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693068855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 305ea7a0-4431-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/3/3065e5a0-f69f-11ec-935a-3d9e52075b07.graphml b/graph/incidents_graphml/3/3065e5a0-f69f-11ec-935a-3d9e52075b07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e74d5f18f9f91e3e1016f4cd19ebcb5a4b2bb3f6 --- /dev/null +++ b/graph/incidents_graphml/3/3065e5a0-f69f-11ec-935a-3d9e52075b07.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.51 + 100.64.25.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.77 + 100.64.72.77 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656392411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3065e5a0-f69f-11ec-935a-3d9e52075b07 + + + INCIDENT_LINK + 1656392411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3065e5a0-f69f-11ec-935a-3d9e52075b07 + + + diff --git a/graph/incidents_graphml/3/306692e0-ea61-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/3/306692e0-ea61-11ee-b380-23a0be8babf0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..261c3826de52b8556086d488a4a077a595583aeb --- /dev/null +++ b/graph/incidents_graphml/3/306692e0-ea61-11ee-b380-23a0be8babf0.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.147 + 100.64.39.147 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.148 + 100.64.39.148 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.149 + 100.64.39.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.67 + 100.64.24.67 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.150 + 100.64.39.150 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.73 + 100.64.7.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.151 + 100.64.39.151 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341364 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306692e0-ea61-11ee-b380-23a0be8babf0 + + + diff --git a/graph/incidents_graphml/3/306c4bd0-544e-11ee-862a-9bdfc30b143b.graphml b/graph/incidents_graphml/3/306c4bd0-544e-11ee-862a-9bdfc30b143b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af7274ce157d8272ad3eb378040e193c67721d5e --- /dev/null +++ b/graph/incidents_graphml/3/306c4bd0-544e-11ee-862a-9bdfc30b143b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.115 + 100.64.62.115 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694840529 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 306c4bd0-544e-11ee-862a-9bdfc30b143b + + + diff --git a/graph/incidents_graphml/3/306e9b30-9cdb-11ee-b9dc-b9fde04d3fe1.graphml b/graph/incidents_graphml/3/306e9b30-9cdb-11ee-b9dc-b9fde04d3fe1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c507ff13d96c74a7d6eac53783f2437850275a61 --- /dev/null +++ b/graph/incidents_graphml/3/306e9b30-9cdb-11ee-b9dc-b9fde04d3fe1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.156 + 100.64.88.156 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.74.211.215 + 100.64.88.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1702817572 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 306e9b30-9cdb-11ee-b9dc-b9fde04d3fe1 + + + diff --git a/graph/incidents_graphml/3/306f2fc0-0b6c-11ed-bc4c-114b5035f7dd.graphml b/graph/incidents_graphml/3/306f2fc0-0b6c-11ed-bc4c-114b5035f7dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71d8b3bd799ce0498a123bbc26bf0e1698530c80 --- /dev/null +++ b/graph/incidents_graphml/3/306f2fc0-0b6c-11ed-bc4c-114b5035f7dd.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.193 + 100.64.76.193 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.49 + 100.64.72.49 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.194 + 100.64.76.194 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.52.86 + 100.64.52.86 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.76.195 + 100.64.76.195 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.235 + 100.64.72.235 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.196 + 100.64.76.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.197 + 100.64.76.197 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.58 + 100.64.73.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.198 + 100.64.76.198 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.199 + 100.64.76.199 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679481 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 306f2fc0-0b6c-11ed-bc4c-114b5035f7dd + + + diff --git a/graph/incidents_graphml/3/307033d0-4431-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/3/307033d0-4431-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d87c4d6187ba92238c9676eb2c952c8d224e8d69 --- /dev/null +++ b/graph/incidents_graphml/3/307033d0-4431-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.117 + 100.64.29.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693068855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 307033d0-4431-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/3/3076bfd0-456b-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/3/3076bfd0-456b-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f595e61ec12c0dc59ee49e73bd8b6af77347e33b --- /dev/null +++ b/graph/incidents_graphml/3/3076bfd0-456b-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,243 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.7 + 100.64.26.7 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.8 + 100.64.26.8 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.9 + 100.64.26.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.10 + 100.64.26.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.11 + 100.64.26.11 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.10 + 100.64.5.10 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693203717 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3076bfd0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203717 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3076bfd0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203717 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3076bfd0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203717 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3076bfd0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203717 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3076bfd0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203717 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3076bfd0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203717 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3076bfd0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203717 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3076bfd0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203717 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3076bfd0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203717 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3076bfd0-456b-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693203717 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3076bfd0-456b-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/3/307945a0-228a-11ef-b3b6-db5488fb138e.graphml b/graph/incidents_graphml/3/307945a0-228a-11ef-b3b6-db5488fb138e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c56c07f02ec1d6277f223f9106feee27b8894321 --- /dev/null +++ b/graph/incidents_graphml/3/307945a0-228a-11ef-b3b6-db5488fb138e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.57 + 100.64.27.57 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717516238 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 307945a0-228a-11ef-b3b6-db5488fb138e + + + diff --git a/graph/incidents_graphml/3/30796690-4147-11ee-a087-e963abb87ef5.graphml b/graph/incidents_graphml/3/30796690-4147-11ee-a087-e963abb87ef5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81ab1d647233a811dafa89774ca79d9013e42a22 --- /dev/null +++ b/graph/incidents_graphml/3/30796690-4147-11ee-a087-e963abb87ef5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.211 + 100.64.28.211 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692748450 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30796690-4147-11ee-a087-e963abb87ef5 + + + diff --git a/graph/incidents_graphml/3/307f6410-9cdb-11ee-b9dc-b9fde04d3fe1.graphml b/graph/incidents_graphml/3/307f6410-9cdb-11ee-b9dc-b9fde04d3fe1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8cf0d5f5ee3a952dc06500588c9490aa49c8bb8e --- /dev/null +++ b/graph/incidents_graphml/3/307f6410-9cdb-11ee-b9dc-b9fde04d3fe1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 100.64.88.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.88.156 + 100.64.88.156 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1702817572 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 307f6410-9cdb-11ee-b9dc-b9fde04d3fe1 + + + diff --git a/graph/incidents_graphml/3/307fa370-fe30-11ed-b9d7-d503d3f2ee6a.graphml b/graph/incidents_graphml/3/307fa370-fe30-11ed-b9d7-d503d3f2ee6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..599380233486a37e359d57365780fc01ffcfdb80 --- /dev/null +++ b/graph/incidents_graphml/3/307fa370-fe30-11ed-b9d7-d503d3f2ee6a.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.51 + 100.64.25.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685371844 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 307fa370-fe30-11ed-b9d7-d503d3f2ee6a + + + INCIDENT_LINK + 1685371844 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 307fa370-fe30-11ed-b9d7-d503d3f2ee6a + + + diff --git a/graph/incidents_graphml/3/30811040-9e24-11ee-9ce0-3dd61bd6a247.graphml b/graph/incidents_graphml/3/30811040-9e24-11ee-9ce0-3dd61bd6a247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cd081de4cde5f49059408e4461a91979fc8fe4a --- /dev/null +++ b/graph/incidents_graphml/3/30811040-9e24-11ee-9ce0-3dd61bd6a247.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.84 + 100.64.13.84 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702958876 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 30811040-9e24-11ee-9ce0-3dd61bd6a247 + + + diff --git a/graph/incidents_graphml/3/308409f0-4431-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/3/308409f0-4431-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e7c8ded9254a4b7f77d04e42ea9b49e8fddb192 --- /dev/null +++ b/graph/incidents_graphml/3/308409f0-4431-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693068855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 308409f0-4431-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/3/3085bee0-5e20-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/3/3085bee0-5e20-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..433c71a1f5499e7d40dc71fe2fd50646eb43d589 --- /dev/null +++ b/graph/incidents_graphml/3/3085bee0-5e20-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.233 + 100.64.53.233 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695920284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3085bee0-5e20-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/3/308ec350-4147-11ee-a087-e963abb87ef5.graphml b/graph/incidents_graphml/3/308ec350-4147-11ee-a087-e963abb87ef5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66496192064d317840797720d5b827480549c6b6 --- /dev/null +++ b/graph/incidents_graphml/3/308ec350-4147-11ee-a087-e963abb87ef5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.211 + 100.64.28.211 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692748450 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 308ec350-4147-11ee-a087-e963abb87ef5 + + + diff --git a/graph/incidents_graphml/3/308f1110-6a7e-11ee-a921-9b336567fa61.graphml b/graph/incidents_graphml/3/308f1110-6a7e-11ee-a921-9b336567fa61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4949ad527c3124aa0de3c2c755b2afe442a847ea --- /dev/null +++ b/graph/incidents_graphml/3/308f1110-6a7e-11ee-a921-9b336567fa61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.22 + 100.64.18.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697280070 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 308f1110-6a7e-11ee-a921-9b336567fa61 + + + diff --git a/graph/incidents_graphml/3/30926910-5e20-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/3/30926910-5e20-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c281efd8770fda9763b3f959423864887490b93 --- /dev/null +++ b/graph/incidents_graphml/3/30926910-5e20-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.241 + 100.64.2.241 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695920284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 30926910-5e20-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/3/309db710-6a7e-11ee-a921-9b336567fa61.graphml b/graph/incidents_graphml/3/309db710-6a7e-11ee-a921-9b336567fa61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ebb8f818c6d6a17a819ebdfbf367da1bf9cc6f64 --- /dev/null +++ b/graph/incidents_graphml/3/309db710-6a7e-11ee-a921-9b336567fa61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.22 + 100.64.18.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697280071 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 309db710-6a7e-11ee-a921-9b336567fa61 + + + diff --git a/graph/incidents_graphml/3/30a13620-5e20-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/3/30a13620-5e20-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..011f1264e357e97ec8d0c69a117af5ca0580ebd4 --- /dev/null +++ b/graph/incidents_graphml/3/30a13620-5e20-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.241 + 100.64.2.241 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695920284 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 30a13620-5e20-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/3/30aecab0-5e20-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/3/30aecab0-5e20-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f79b114e588eb917a4344fadc3d5ece2a77af86 --- /dev/null +++ b/graph/incidents_graphml/3/30aecab0-5e20-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.228 + 100.64.51.228 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695920284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30aecab0-5e20-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/3/30b313d0-6a7e-11ee-a921-9b336567fa61.graphml b/graph/incidents_graphml/3/30b313d0-6a7e-11ee-a921-9b336567fa61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8620e0bb6c445bbdc6875a234eda9d20c7534ecc --- /dev/null +++ b/graph/incidents_graphml/3/30b313d0-6a7e-11ee-a921-9b336567fa61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.24 + 100.64.18.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697280071 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30b313d0-6a7e-11ee-a921-9b336567fa61 + + + diff --git a/graph/incidents_graphml/3/30b63d80-4431-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/3/30b63d80-4431-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f68b84affb1e0e6dda865269e9e68800b907ccb7 --- /dev/null +++ b/graph/incidents_graphml/3/30b63d80-4431-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.126 + 100.64.30.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693068855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30b63d80-4431-11ee-8b8f-a1a07f616025 + + + INCIDENT_LINK + 1693068855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30b63d80-4431-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/3/30b9f810-f6aa-11ec-86ed-01daccdabaa6.graphml b/graph/incidents_graphml/3/30b9f810-f6aa-11ec-86ed-01daccdabaa6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..024f60b525add2de462a1c62f72dd4e5da387fb7 --- /dev/null +++ b/graph/incidents_graphml/3/30b9f810-f6aa-11ec-86ed-01daccdabaa6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.28 + 100.64.74.28 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.1.166 + USER-0015-1615.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656397136 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 30b9f810-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397136 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 30b9f810-f6aa-11ec-86ed-01daccdabaa6 + + + diff --git a/graph/incidents_graphml/3/30bdbed0-5e20-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/3/30bdbed0-5e20-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2fa5208b234114b21dbda204a8e0935a94a576ed --- /dev/null +++ b/graph/incidents_graphml/3/30bdbed0-5e20-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.228 + 100.64.51.228 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695920284 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 30bdbed0-5e20-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/3/30c6c2e0-6a7e-11ee-a921-9b336567fa61.graphml b/graph/incidents_graphml/3/30c6c2e0-6a7e-11ee-a921-9b336567fa61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9857fb88b13c7e193804154c445f895a9e509541 --- /dev/null +++ b/graph/incidents_graphml/3/30c6c2e0-6a7e-11ee-a921-9b336567fa61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.24 + 100.64.18.24 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697280071 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 30c6c2e0-6a7e-11ee-a921-9b336567fa61 + + + diff --git a/graph/incidents_graphml/3/30c7f0c0-4431-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/3/30c7f0c0-4431-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad57af6cb97c9d8f1344d78a1805f61f60b32787 --- /dev/null +++ b/graph/incidents_graphml/3/30c7f0c0-4431-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.126 + 100.64.30.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693068855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 30c7f0c0-4431-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/3/30ce1280-5e20-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/3/30ce1280-5e20-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a7bbb01f5d6e0f9c95d69e556728b1c48d50029 --- /dev/null +++ b/graph/incidents_graphml/3/30ce1280-5e20-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.233 + 100.64.53.233 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695920284 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 30ce1280-5e20-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/3/30d7a830-4431-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/3/30d7a830-4431-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ace770ea1f55ce1c0f4161ee93cabff47fd7abb --- /dev/null +++ b/graph/incidents_graphml/3/30d7a830-4431-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.189 + 100.64.14.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693068855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30d7a830-4431-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/3/30db8000-5e20-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/3/30db8000-5e20-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..495da1c2b01420c898af83a72086a1aaaf1d8bf5 --- /dev/null +++ b/graph/incidents_graphml/3/30db8000-5e20-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.48 + 100.64.16.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695920284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30db8000-5e20-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/3/30dc1fa0-6a7e-11ee-a921-9b336567fa61.graphml b/graph/incidents_graphml/3/30dc1fa0-6a7e-11ee-a921-9b336567fa61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1be2f06d32fbba20cb5fa35a5521fcdac04fca1a --- /dev/null +++ b/graph/incidents_graphml/3/30dc1fa0-6a7e-11ee-a921-9b336567fa61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.26 + 100.64.18.26 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697280071 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 30dc1fa0-6a7e-11ee-a921-9b336567fa61 + + + diff --git a/graph/incidents_graphml/3/30eb1060-5e20-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/3/30eb1060-5e20-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9db4311384bff53ca548ef634e41e43c9578380 --- /dev/null +++ b/graph/incidents_graphml/3/30eb1060-5e20-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.48 + 100.64.16.48 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695920284 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 30eb1060-5e20-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/3/30ec78a0-a10b-11ee-892c-e7dd0a01bb73.graphml b/graph/incidents_graphml/3/30ec78a0-a10b-11ee-892c-e7dd0a01bb73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46979220fe978e06736e4a757c7e573c91228ea4 --- /dev/null +++ b/graph/incidents_graphml/3/30ec78a0-a10b-11ee-892c-e7dd0a01bb73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.106 + 100.64.49.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703277993 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30ec78a0-a10b-11ee-892c-e7dd0a01bb73 + + + diff --git a/graph/incidents_graphml/3/30f06ba0-44c6-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/3/30f06ba0-44c6-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b3880a98e1c2e232c51d2ef0d957f5ac5845ace --- /dev/null +++ b/graph/incidents_graphml/3/30f06ba0-44c6-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.75 + 100.64.8.75 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693132851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 30f06ba0-44c6-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/3/30f7e620-35a6-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/3/30f7e620-35a6-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2584111c51ba370067216855ef268bb0b4f78826 --- /dev/null +++ b/graph/incidents_graphml/3/30f7e620-35a6-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.220 + 100.64.23.220 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691469839 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 30f7e620-35a6-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/3/31029410-44c6-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/3/31029410-44c6-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f514039fd06a21303d81bbc2b102878136f0a5b --- /dev/null +++ b/graph/incidents_graphml/3/31029410-44c6-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.75 + 100.64.8.75 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693132851 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 31029410-44c6-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/3/31122470-44c6-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/3/31122470-44c6-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..973b1b9d35d081b5d7e0ff0a7dd7aab41b7f33c1 --- /dev/null +++ b/graph/incidents_graphml/3/31122470-44c6-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.229 + 100.64.28.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693132851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 31122470-44c6-11ee-8b8f-a1a07f616025 + + + INCIDENT_LINK + 1693132851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 31122470-44c6-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/3/31166a40-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/31166a40-8acf-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6679583dc56223e1066c6742418c627e2f9e27f7 --- /dev/null +++ b/graph/incidents_graphml/3/31166a40-8acf-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.48 + 100.64.16.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700833298 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 31166a40-8acf-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/3/311bec00-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/311bec00-1dab-11ed-b2e7-abaef9f1b8f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61eb60e999f5519c7343cc56ce2968137234a120 --- /dev/null +++ b/graph/incidents_graphml/3/311bec00-1dab-11ed-b2e7-abaef9f1b8f2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.89.123 + 192.168.89.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.111 + 100.64.76.111 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660685661 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 311bec00-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685661 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 311bec00-1dab-11ed-b2e7-abaef9f1b8f2 + + + diff --git a/graph/incidents_graphml/3/3121b4d0-44c6-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/3/3121b4d0-44c6-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..983604e669bca7aafa36cf608c6cd8bddcb96c4a --- /dev/null +++ b/graph/incidents_graphml/3/3121b4d0-44c6-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.229 + 100.64.28.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693132851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3121b4d0-44c6-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/3/3132cbe0-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/3132cbe0-8acf-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26c9f408b1fba4cfdf4be2a220b62b78bf0a8faf --- /dev/null +++ b/graph/incidents_graphml/3/3132cbe0-8acf-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.7 + 100.64.10.7 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700833298 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3132cbe0-8acf-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/3/31378670-4147-11ee-a087-e963abb87ef5.graphml b/graph/incidents_graphml/3/31378670-4147-11ee-a087-e963abb87ef5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..daaa782f1b8c41fabaa0fba5b3f5f1296fc8ee33 --- /dev/null +++ b/graph/incidents_graphml/3/31378670-4147-11ee-a087-e963abb87ef5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.213 + 100.64.28.213 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692748452 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 31378670-4147-11ee-a087-e963abb87ef5 + + + diff --git a/graph/incidents_graphml/3/313839b0-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/313839b0-2f33-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a007e9e9fff76ae76acae29423a84a0bfe887de2 --- /dev/null +++ b/graph/incidents_graphml/3/313839b0-2f33-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,265 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.137 + 100.64.72.137 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.46 + 100.64.82.46 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.123 + 100.64.72.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.137 + 100.64.74.137 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.9.191 + 100.64.9.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.184 + 100.64.77.184 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.47 + 100.64.82.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.121 + 100.64.71.121 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690760741 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313839b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760741 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313839b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760741 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313839b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760741 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313839b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760741 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313839b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760741 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313839b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760741 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313839b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760741 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313839b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760741 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313839b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760741 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313839b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760741 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313839b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760741 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313839b0-2f33-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/3/313cdd40-6a7e-11ee-a921-9b336567fa61.graphml b/graph/incidents_graphml/3/313cdd40-6a7e-11ee-a921-9b336567fa61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab701253215fba8943dba44db3336cc03b89a968 --- /dev/null +++ b/graph/incidents_graphml/3/313cdd40-6a7e-11ee-a921-9b336567fa61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.163 + 100.64.16.163 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697280072 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 313cdd40-6a7e-11ee-a921-9b336567fa61 + + + diff --git a/graph/incidents_graphml/3/313d7670-dbb1-11ee-a665-15e5a5884e11.graphml b/graph/incidents_graphml/3/313d7670-dbb1-11ee-a665-15e5a5884e11.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57a48ba9840b56036b793c18bd34d3dc9dd9094c --- /dev/null +++ b/graph/incidents_graphml/3/313d7670-dbb1-11ee-a665-15e5a5884e11.graphml @@ -0,0 +1,265 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.193 + 100.64.45.193 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.136 + 100.64.20.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.53 + 100.64.33.53 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.243 + 100.64.50.243 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.202 + 100.64.14.202 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.22 + 100.64.21.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709726457 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 313d7670-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726457 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 313d7670-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726457 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 313d7670-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726457 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 313d7670-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726457 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 313d7670-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726457 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 313d7670-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726457 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 313d7670-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726457 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 313d7670-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726457 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 313d7670-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726457 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 313d7670-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726457 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 313d7670-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726457 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 313d7670-dbb1-11ee-a665-15e5a5884e11 + + + diff --git a/graph/incidents_graphml/3/3140d5a0-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/3140d5a0-8acf-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..766d96024d6c3ec7f356a2d4f6dc1aaf08093816 --- /dev/null +++ b/graph/incidents_graphml/3/3140d5a0-8acf-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.7 + 100.64.10.7 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700833298 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3140d5a0-8acf-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/3/3145f320-f96e-11ed-917d-d573a97593c4.graphml b/graph/incidents_graphml/3/3145f320-f96e-11ed-917d-d573a97593c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3dce1d11b1ddf92d12f34dc96db17c055e2a913 --- /dev/null +++ b/graph/incidents_graphml/3/3145f320-f96e-11ed-917d-d573a97593c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.15.80 + 100.64.15.80 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684848718 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3145f320-f96e-11ed-917d-d573a97593c4 + + + diff --git a/graph/incidents_graphml/3/314ddb10-7c83-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/314ddb10-7c83-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4624e35ff9f926d6d719d07b57b80b0e4ba38532 --- /dev/null +++ b/graph/incidents_graphml/3/314ddb10-7c83-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.157 + 100.64.52.157 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699261340 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 314ddb10-7c83-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/314f7e00-aac0-11ee-a834-01ba9434432f.graphml b/graph/incidents_graphml/3/314f7e00-aac0-11ee-a834-01ba9434432f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ff59f8dfe1e2969ce2aa7fdb9ad9096ecdbd00b --- /dev/null +++ b/graph/incidents_graphml/3/314f7e00-aac0-11ee-a834-01ba9434432f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.242 + 100.64.12.242 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704345293 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 314f7e00-aac0-11ee-a834-01ba9434432f + + + INCIDENT_LINK + 1704345293 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 314f7e00-aac0-11ee-a834-01ba9434432f + + + diff --git a/graph/incidents_graphml/3/31656f80-609c-11ee-a28d-59a2fed71cde.graphml b/graph/incidents_graphml/3/31656f80-609c-11ee-a28d-59a2fed71cde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a785a95aa52701833dc190d60c254aea9a543aaa --- /dev/null +++ b/graph/incidents_graphml/3/31656f80-609c-11ee-a28d-59a2fed71cde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.161 + 100.64.9.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696193445 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 31656f80-609c-11ee-a28d-59a2fed71cde + + + diff --git a/graph/incidents_graphml/3/316b9280-f341-11ec-a343-c72f25ca2eb2.graphml b/graph/incidents_graphml/3/316b9280-f341-11ec-a343-c72f25ca2eb2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36c8d6756bcd916234397f3530c9f958009227e1 --- /dev/null +++ b/graph/incidents_graphml/3/316b9280-f341-11ec-a343-c72f25ca2eb2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.157 + USER-0015-1738.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656022186 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 316b9280-f341-11ec-a343-c72f25ca2eb2 + + + INCIDENT_LINK + 1656022186 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 316b9280-f341-11ec-a343-c72f25ca2eb2 + + + diff --git a/graph/incidents_graphml/3/316b9eb0-330e-11ef-902d-e51cc7e52d4a.graphml b/graph/incidents_graphml/3/316b9eb0-330e-11ef-902d-e51cc7e52d4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b33248fc7af6601e3009540146542b063d8d3701 --- /dev/null +++ b/graph/incidents_graphml/3/316b9eb0-330e-11ef-902d-e51cc7e52d4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.46.208 + USER-0015-1982.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.17 + USER-0015-2097.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719332152 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 316b9eb0-330e-11ef-902d-e51cc7e52d4a + + + diff --git a/graph/incidents_graphml/3/3170afe0-ea61-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/3/3170afe0-ea61-11ee-b380-23a0be8babf0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32cf2c8d72d2e5ca1cf14b1718568013e6920314 --- /dev/null +++ b/graph/incidents_graphml/3/3170afe0-ea61-11ee-b380-23a0be8babf0.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.138 + 100.64.36.138 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.76 + 100.64.8.76 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.38 + 100.64.24.38 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.83 + 100.64.33.83 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711341365 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3170afe0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3170afe0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3170afe0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3170afe0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3170afe0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3170afe0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3170afe0-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3170afe0-ea61-11ee-b380-23a0be8babf0 + + + diff --git a/graph/incidents_graphml/3/3173c760-609c-11ee-a28d-59a2fed71cde.graphml b/graph/incidents_graphml/3/3173c760-609c-11ee-a28d-59a2fed71cde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1370662809d9b7b1711f0675a65d8f6d47afa893 --- /dev/null +++ b/graph/incidents_graphml/3/3173c760-609c-11ee-a28d-59a2fed71cde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.112 + 100.64.31.112 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696193445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3173c760-609c-11ee-a28d-59a2fed71cde + + + diff --git a/graph/incidents_graphml/3/3173ee80-fe30-11ed-b9d7-d503d3f2ee6a.graphml b/graph/incidents_graphml/3/3173ee80-fe30-11ed-b9d7-d503d3f2ee6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8aeda6f0d726c0e872281582135e34b903f2696c --- /dev/null +++ b/graph/incidents_graphml/3/3173ee80-fe30-11ed-b9d7-d503d3f2ee6a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.23.2 + 100.64.23.2 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685371846 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3173ee80-fe30-11ed-b9d7-d503d3f2ee6a + + + diff --git a/graph/incidents_graphml/3/3173fb60-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/3173fb60-fcb8-11ed-bdca-e96ab691d6d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..600c75520bea613c20edf5c854c02597a8cb3c6d --- /dev/null +++ b/graph/incidents_graphml/3/3173fb60-fcb8-11ed-bdca-e96ab691d6d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.20.181 + 100.64.20.181 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685210355 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3173fb60-fcb8-11ed-bdca-e96ab691d6d5 + + + diff --git a/graph/incidents_graphml/3/31767900-f96e-11ed-917d-d573a97593c4.graphml b/graph/incidents_graphml/3/31767900-f96e-11ed-917d-d573a97593c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..414c34ab6880f8b60d2f968554453bdd86e52906 --- /dev/null +++ b/graph/incidents_graphml/3/31767900-f96e-11ed-917d-d573a97593c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.30.58 + 100.64.30.58 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684848719 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 31767900-f96e-11ed-917d-d573a97593c4 + + + diff --git a/graph/incidents_graphml/3/31787fe0-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/3/31787fe0-0948-11ee-899e-3d5be197ab3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c24b8436acc983f3ce895269eb6a1994727b0aa0 --- /dev/null +++ b/graph/incidents_graphml/3/31787fe0-0948-11ee-899e-3d5be197ab3b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.148 + 100.64.79.148 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.53 + 100.64.73.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686591616 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31787fe0-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591616 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31787fe0-0948-11ee-899e-3d5be197ab3b + + + diff --git a/graph/incidents_graphml/3/3181f830-609c-11ee-a28d-59a2fed71cde.graphml b/graph/incidents_graphml/3/3181f830-609c-11ee-a28d-59a2fed71cde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ca165fb02e058e3ad870e3c7a64ae164222010c --- /dev/null +++ b/graph/incidents_graphml/3/3181f830-609c-11ee-a28d-59a2fed71cde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.112 + 100.64.31.112 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696193445 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3181f830-609c-11ee-a28d-59a2fed71cde + + + diff --git a/graph/incidents_graphml/3/31837490-ea61-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/3/31837490-ea61-11ee-b380-23a0be8babf0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..305b19ad0850aea4c35f9c1f330085aaa27a1bcd --- /dev/null +++ b/graph/incidents_graphml/3/31837490-ea61-11ee-b380-23a0be8babf0.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.157 + 100.64.39.157 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.172 + 100.64.14.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.158 + USER-0015-1323.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.39.159 + 100.64.39.159 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.120 + 100.64.8.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.231 + 100.64.23.231 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.83 + 100.64.17.83 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711341365 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31837490-ea61-11ee-b380-23a0be8babf0 + + + diff --git a/graph/incidents_graphml/3/319e9a70-f96e-11ed-917d-d573a97593c4.graphml b/graph/incidents_graphml/3/319e9a70-f96e-11ed-917d-d573a97593c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e97485231089354a0fb8cc471a20b6cf65bd8eb3 --- /dev/null +++ b/graph/incidents_graphml/3/319e9a70-f96e-11ed-917d-d573a97593c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.29.52 + 100.64.29.52 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684848719 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 319e9a70-f96e-11ed-917d-d573a97593c4 + + + diff --git a/graph/incidents_graphml/3/319f74a0-544e-11ee-862a-9bdfc30b143b.graphml b/graph/incidents_graphml/3/319f74a0-544e-11ee-862a-9bdfc30b143b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae086e491ec5a5bcd58015ddd8c844d48c3d691b --- /dev/null +++ b/graph/incidents_graphml/3/319f74a0-544e-11ee-862a-9bdfc30b143b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.117 + 100.64.62.117 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694840531 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 319f74a0-544e-11ee-862a-9bdfc30b143b + + + diff --git a/graph/incidents_graphml/3/31ad8e90-f96e-11ed-917d-d573a97593c4.graphml b/graph/incidents_graphml/3/31ad8e90-f96e-11ed-917d-d573a97593c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..094c2a880dfa53c51ab4c0d48aa8a8b156e01bb2 --- /dev/null +++ b/graph/incidents_graphml/3/31ad8e90-f96e-11ed-917d-d573a97593c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.13.57 + 100.64.13.57 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684848719 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 31ad8e90-f96e-11ed-917d-d573a97593c4 + + + diff --git a/graph/incidents_graphml/3/31ad9640-2130-11ed-8301-ff97348d54b7.graphml b/graph/incidents_graphml/3/31ad9640-2130-11ed-8301-ff97348d54b7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c4a5bb15ca8ca840ebe80c3b7292514649d60f3 --- /dev/null +++ b/graph/incidents_graphml/3/31ad9640-2130-11ed-8301-ff97348d54b7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.96 + 100.64.84.96 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661072639 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 31ad9640-2130-11ed-8301-ff97348d54b7 + + + diff --git a/graph/incidents_graphml/3/31afb8e0-7a0c-11ee-9002-0de92ece484d.graphml b/graph/incidents_graphml/3/31afb8e0-7a0c-11ee-9002-0de92ece484d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe30b0e2f6e9479cda660148d15e192480285e17 --- /dev/null +++ b/graph/incidents_graphml/3/31afb8e0-7a0c-11ee-9002-0de92ece484d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.253 + 100.64.14.253 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698990328 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 31afb8e0-7a0c-11ee-9002-0de92ece484d + + + diff --git a/graph/incidents_graphml/3/31b57cd0-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/31b57cd0-9cb3-11ed-8977-e596d5530bb8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8ce2f242932877f51f0c5307e9774eb0aa479c5 --- /dev/null +++ b/graph/incidents_graphml/3/31b57cd0-9cb3-11ed-8977-e596d5530bb8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.16 + 100.64.93.16 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1674652896 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 31b57cd0-9cb3-11ed-8977-e596d5530bb8 + + + diff --git a/graph/incidents_graphml/3/31ba37c0-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/31ba37c0-9cb3-11ed-8977-e596d5530bb8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e4261a6b1a6a70e6f1e64a223f56bcbb7064ce6 --- /dev/null +++ b/graph/incidents_graphml/3/31ba37c0-9cb3-11ed-8977-e596d5530bb8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.16 + 100.64.93.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1674652896 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 31ba37c0-9cb3-11ed-8977-e596d5530bb8 + + + diff --git a/graph/incidents_graphml/3/31c22f70-7a0c-11ee-9002-0de92ece484d.graphml b/graph/incidents_graphml/3/31c22f70-7a0c-11ee-9002-0de92ece484d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e74217fb328ad6a11395d0fbcd12712ee5c8afc5 --- /dev/null +++ b/graph/incidents_graphml/3/31c22f70-7a0c-11ee-9002-0de92ece484d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.253 + 100.64.14.253 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698990328 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 31c22f70-7a0c-11ee-9002-0de92ece484d + + + diff --git a/graph/incidents_graphml/3/31d005d0-330e-11ef-902d-e51cc7e52d4a.graphml b/graph/incidents_graphml/3/31d005d0-330e-11ef-902d-e51cc7e52d4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8725fb6c39e3e87ce80ebc3775c7e980c967d7a --- /dev/null +++ b/graph/incidents_graphml/3/31d005d0-330e-11ef-902d-e51cc7e52d4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + USER-0015-1979.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.26 + HOST-18383 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719332153 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 31d005d0-330e-11ef-902d-e51cc7e52d4a + + + diff --git a/graph/incidents_graphml/3/31dc7b60-0b6c-11ed-bc4c-114b5035f7dd.graphml b/graph/incidents_graphml/3/31dc7b60-0b6c-11ed-bc4c-114b5035f7dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ffb2504f75de4f97c99717936d2543b9b15816e --- /dev/null +++ b/graph/incidents_graphml/3/31dc7b60-0b6c-11ed-bc4c-114b5035f7dd.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.200 + 100.64.76.200 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.76.201 + 100.64.76.201 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.202 + 100.64.76.202 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.203 + 100.64.76.203 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.76.204 + 100.64.76.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658679483 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31dc7b60-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679483 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31dc7b60-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679483 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31dc7b60-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679483 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31dc7b60-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679483 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31dc7b60-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679483 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31dc7b60-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679483 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31dc7b60-0b6c-11ed-bc4c-114b5035f7dd + + + INCIDENT_LINK + 1658679483 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31dc7b60-0b6c-11ed-bc4c-114b5035f7dd + + + diff --git a/graph/incidents_graphml/3/31e36ba0-f96e-11ed-917d-d573a97593c4.graphml b/graph/incidents_graphml/3/31e36ba0-f96e-11ed-917d-d573a97593c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..73654967267a442e9ff8a31659e3c1b908b70641 --- /dev/null +++ b/graph/incidents_graphml/3/31e36ba0-f96e-11ed-917d-d573a97593c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.39.105 + 100.64.39.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684848719 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 31e36ba0-f96e-11ed-917d-d573a97593c4 + + + diff --git a/graph/incidents_graphml/3/31e386c0-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/3/31e386c0-0c5d-11ed-b597-112eae6df069.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d3c80ff938500d7c22a086d10d1004c114b1630 --- /dev/null +++ b/graph/incidents_graphml/3/31e386c0-0c5d-11ed-b597-112eae6df069.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.119 + 100.64.78.119 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.4 + 100.64.72.4 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658782992 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31e386c0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658782992 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31e386c0-0c5d-11ed-b597-112eae6df069 + + + diff --git a/graph/incidents_graphml/3/31ec71b0-3b6c-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/3/31ec71b0-3b6c-11ee-a7d4-a597d065c4ef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7597c8ecf99a0c4b089195956222dbfbe096ef9 --- /dev/null +++ b/graph/incidents_graphml/3/31ec71b0-3b6c-11ee-a7d4-a597d065c4ef.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.151 + 100.64.27.151 + ["Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.131 + 100.64.34.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.230 + 100.64.9.230 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.95 + 100.64.12.95 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.172 + 100.64.64.172 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.10 + 100.64.16.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.173 + 100.64.64.173 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.174 + 100.64.49.174 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.236 + 100.64.46.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.182 + 100.64.38.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.174 + 100.64.64.174 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.175 + 100.64.64.175 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.51 + 100.64.7.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.176 + 100.64.64.176 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.177 + 100.64.64.177 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.89 + 100.64.7.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.131 + 100.64.50.131 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.178 + 100.64.64.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.51 + 100.64.25.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + INCIDENT_LINK + 1692104637 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31ec71b0-3b6c-11ee-a7d4-a597d065c4ef + + + diff --git a/graph/incidents_graphml/3/31ee0070-609c-11ee-a28d-59a2fed71cde.graphml b/graph/incidents_graphml/3/31ee0070-609c-11ee-a28d-59a2fed71cde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd825b4bb5e24ce83251fb95811e20a8f4607167 --- /dev/null +++ b/graph/incidents_graphml/3/31ee0070-609c-11ee-a28d-59a2fed71cde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.29 + 100.64.62.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696193446 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 31ee0070-609c-11ee-a28d-59a2fed71cde + + + diff --git a/graph/incidents_graphml/3/31f378a0-7a0c-11ee-9002-0de92ece484d.graphml b/graph/incidents_graphml/3/31f378a0-7a0c-11ee-9002-0de92ece484d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4601cdbf70b66b36ab782430a485d7f47fa702b7 --- /dev/null +++ b/graph/incidents_graphml/3/31f378a0-7a0c-11ee-9002-0de92ece484d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.191 + 100.64.45.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698990329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 31f378a0-7a0c-11ee-9002-0de92ece484d + + + diff --git a/graph/incidents_graphml/3/31f5a9c0-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/31f5a9c0-3477-11ee-95f5-05a30bfe2201.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9261ab62d2ac7e5dd9641e838344067afa731948 --- /dev/null +++ b/graph/incidents_graphml/3/31f5a9c0-3477-11ee-95f5-05a30bfe2201.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.5 + 100.64.53.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691339704 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31f5a9c0-3477-11ee-95f5-05a30bfe2201 + + + diff --git a/graph/incidents_graphml/3/31fa1880-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/3/31fa1880-65f9-11ee-b910-4dbb90e8cc17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..026f2e4e77e68d2c4631905e70b83bdd0a3eb9e4 --- /dev/null +++ b/graph/incidents_graphml/3/31fa1880-65f9-11ee-b910-4dbb90e8cc17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.83 + 100.64.14.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696783145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 31fa1880-65f9-11ee-b910-4dbb90e8cc17 + + + diff --git a/graph/incidents_graphml/3/31fab940-c84f-11ed-9476-bf08a649e623.graphml b/graph/incidents_graphml/3/31fab940-c84f-11ed-9476-bf08a649e623.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7ebdda5419e49e6f9e18d1bc5698af64c2c06dc --- /dev/null +++ b/graph/incidents_graphml/3/31fab940-c84f-11ed-9476-bf08a649e623.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.82 + 172.25.216.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Barracuda WAF"] + + + HOST + 172.16.253.80 + 172.16.253.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + INCIDENT_LINK + 1679447798 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 31fab940-c84f-11ed-9476-bf08a649e623 + + + diff --git a/graph/incidents_graphml/3/31fd7e70-330e-11ef-902d-e51cc7e52d4a.graphml b/graph/incidents_graphml/3/31fd7e70-330e-11ef-902d-e51cc7e52d4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0811ffb21501626b55f22d93742255c2cc815b63 --- /dev/null +++ b/graph/incidents_graphml/3/31fd7e70-330e-11ef-902d-e51cc7e52d4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.32 + USER-0015-2098.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1719332153 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 31fd7e70-330e-11ef-902d-e51cc7e52d4a + + + diff --git a/graph/incidents_graphml/3/31fd90d0-609c-11ee-a28d-59a2fed71cde.graphml b/graph/incidents_graphml/3/31fd90d0-609c-11ee-a28d-59a2fed71cde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19e3a979596cbc16cd5f9daf44878aa79b656118 --- /dev/null +++ b/graph/incidents_graphml/3/31fd90d0-609c-11ee-a28d-59a2fed71cde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.30 + 100.64.62.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696193446 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 31fd90d0-609c-11ee-a28d-59a2fed71cde + + + diff --git a/graph/incidents_graphml/3/320a5490-f96e-11ed-917d-d573a97593c4.graphml b/graph/incidents_graphml/3/320a5490-f96e-11ed-917d-d573a97593c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..593d20a9b3276375d17b62436c8e80e9c8178f4a --- /dev/null +++ b/graph/incidents_graphml/3/320a5490-f96e-11ed-917d-d573a97593c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.107 + 100.64.39.107 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684848720 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 320a5490-f96e-11ed-917d-d573a97593c4 + + + diff --git a/graph/incidents_graphml/3/320c17f0-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/320c17f0-3477-11ee-95f5-05a30bfe2201.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad9af7dde804bab14f8a98457cb6bf072def04ae --- /dev/null +++ b/graph/incidents_graphml/3/320c17f0-3477-11ee-95f5-05a30bfe2201.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.5 + 100.64.53.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691339704 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 320c17f0-3477-11ee-95f5-05a30bfe2201 + + + diff --git a/graph/incidents_graphml/3/320c19e0-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/3/320c19e0-65f9-11ee-b910-4dbb90e8cc17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e5124d2686539ca13e826b1ccc3ee4cbbf68621 --- /dev/null +++ b/graph/incidents_graphml/3/320c19e0-65f9-11ee-b910-4dbb90e8cc17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.14.83 + 100.64.14.83 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696783145 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 320c19e0-65f9-11ee-b910-4dbb90e8cc17 + + + diff --git a/graph/incidents_graphml/3/32125670-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/32125670-8acf-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a55135c1c89efbdaf44e5c7a4b7afd8873ba900 --- /dev/null +++ b/graph/incidents_graphml/3/32125670-8acf-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.109 + 100.64.7.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700833299 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32125670-8acf-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/3/3212be60-3b6c-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/3/3212be60-3b6c-11ee-a7d4-a597d065c4ef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5fe06e3727f1e2054e8c382f83df80b754b7d9e --- /dev/null +++ b/graph/incidents_graphml/3/3212be60-3b6c-11ee-a7d4-a597d065c4ef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.151 + 100.64.27.151 + ["Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692104637 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3212be60-3b6c-11ee-a7d4-a597d065c4ef + + + diff --git a/graph/incidents_graphml/3/32161f80-2d7c-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/3/32161f80-2d7c-11ef-88d9-1fb9581a602f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e1bb78512d7a2c92405e5efd59c7c7afaf3157e --- /dev/null +++ b/graph/incidents_graphml/3/32161f80-2d7c-11ef-88d9-1fb9581a602f.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.46.208 + 172.16.46.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.196 + HOST-18495 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718719691 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32161f80-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719691 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32161f80-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719691 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32161f80-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719691 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32161f80-2d7c-11ef-88d9-1fb9581a602f + + + diff --git a/graph/incidents_graphml/3/32167960-152d-11ef-94b2-9fdc46810273.graphml b/graph/incidents_graphml/3/32167960-152d-11ef-94b2-9fdc46810273.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fb3dbb6d8aeccb885ac2dd7012ecb1ecdc35983 --- /dev/null +++ b/graph/incidents_graphml/3/32167960-152d-11ef-94b2-9fdc46810273.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.176 + 100.64.14.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + INCIDENT_LINK + 1716046933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 32167960-152d-11ef-94b2-9fdc46810273 + + + diff --git a/graph/incidents_graphml/3/32181510-0483-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/32181510-0483-11ee-9300-094b5588de47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8c6f90e7d6fd6fb4957ba1714979f0c19ec06202 --- /dev/null +++ b/graph/incidents_graphml/3/32181510-0483-11ee-9300-094b5588de47.graphml @@ -0,0 +1,171 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.27.191 + 100.64.27.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.60.115 + 100.64.60.115 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.116 + 100.64.60.116 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.5 + 100.64.19.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32181510-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32181510-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32181510-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32181510-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32181510-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32181510-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32181510-0483-11ee-9300-094b5588de47 + + + diff --git a/graph/incidents_graphml/3/321b9840-77d6-11ee-8945-efc081163466.graphml b/graph/incidents_graphml/3/321b9840-77d6-11ee-8945-efc081163466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4de3a7ac5707861d9e370e79d45ff5be4ada8bc --- /dev/null +++ b/graph/incidents_graphml/3/321b9840-77d6-11ee-8945-efc081163466.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.155 + 100.64.27.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747234 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 321b9840-77d6-11ee-8945-efc081163466 + + + diff --git a/graph/incidents_graphml/3/321deed0-4147-11ee-a087-e963abb87ef5.graphml b/graph/incidents_graphml/3/321deed0-4147-11ee-a087-e963abb87ef5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..74b5ef0f4d7a4f3359373e76a0cfb88fddb4e485 --- /dev/null +++ b/graph/incidents_graphml/3/321deed0-4147-11ee-a087-e963abb87ef5.graphml @@ -0,0 +1,409 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.215 + 100.64.28.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.216 + 100.64.28.216 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.188 + 100.64.25.188 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.204 + 100.64.2.204 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.217 + 100.64.28.217 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.235 + 100.64.10.235 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.218 + USER-0015-1275.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.219 + 100.64.28.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.236 + 100.64.15.236 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.220 + 100.64.28.220 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + INCIDENT_LINK + 1692748453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 321deed0-4147-11ee-a087-e963abb87ef5 + + + diff --git a/graph/incidents_graphml/3/3220da60-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/3/3220da60-65f9-11ee-b910-4dbb90e8cc17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c19f15d8d58174df1f6b164c539d359544d50eb --- /dev/null +++ b/graph/incidents_graphml/3/3220da60-65f9-11ee-b910-4dbb90e8cc17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.183 + 100.64.92.183 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696783145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3220da60-65f9-11ee-b910-4dbb90e8cc17 + + + diff --git a/graph/incidents_graphml/3/322b4a10-f96e-11ed-917d-d573a97593c4.graphml b/graph/incidents_graphml/3/322b4a10-f96e-11ed-917d-d573a97593c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96ed84b6ec2376895c21555dc99fb3225c0e6c0e --- /dev/null +++ b/graph/incidents_graphml/3/322b4a10-f96e-11ed-917d-d573a97593c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.39.107 + 100.64.39.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684848720 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 322b4a10-f96e-11ed-917d-d573a97593c4 + + + diff --git a/graph/incidents_graphml/3/322fa770-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/3/322fa770-65f9-11ee-b910-4dbb90e8cc17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4f905c17eb8ca16ebbb1e391db4c4a166ae7e07 --- /dev/null +++ b/graph/incidents_graphml/3/322fa770-65f9-11ee-b910-4dbb90e8cc17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.183 + 100.64.92.183 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696783145 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 322fa770-65f9-11ee-b910-4dbb90e8cc17 + + + diff --git a/graph/incidents_graphml/3/322fe2d0-0483-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/322fe2d0-0483-11ee-9300-094b5588de47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..335fd32eab47baad245fb221921f2b16a32af5aa --- /dev/null +++ b/graph/incidents_graphml/3/322fe2d0-0483-11ee-9300-094b5588de47.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.60.119 + 100.64.60.119 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.47 + 100.64.11.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.20.255 + 100.64.20.255 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.120 + 100.64.60.120 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.77 + 100.64.14.77 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 322fe2d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 322fe2d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 322fe2d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 322fe2d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 322fe2d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 322fe2d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 322fe2d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 322fe2d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 322fe2d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067202 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 322fe2d0-0483-11ee-9300-094b5588de47 + + + diff --git a/graph/incidents_graphml/3/32323ec0-152d-11ef-94b2-9fdc46810273.graphml b/graph/incidents_graphml/3/32323ec0-152d-11ef-94b2-9fdc46810273.graphml new file mode 100644 index 0000000000000000000000000000000000000000..808a2dee10921fde6c9bf59d3729f0f796d5d8f9 --- /dev/null +++ b/graph/incidents_graphml/3/32323ec0-152d-11ef-94b2-9fdc46810273.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 100.64.14.176 + 100.64.14.176 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716046933 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 32323ec0-152d-11ef-94b2-9fdc46810273 + + + diff --git a/graph/incidents_graphml/3/32327ba0-77d6-11ee-8945-efc081163466.graphml b/graph/incidents_graphml/3/32327ba0-77d6-11ee-8945-efc081163466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d029ba2b59f0ef77f21bec5e6e770fabea6008b --- /dev/null +++ b/graph/incidents_graphml/3/32327ba0-77d6-11ee-8945-efc081163466.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.155 + 100.64.27.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747234 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32327ba0-77d6-11ee-8945-efc081163466 + + + diff --git a/graph/incidents_graphml/3/32350020-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/3/32350020-9f48-11ee-b79d-9f7e35646416.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2d78b759828ccd9daaa1213108d1ea6796c3dcb --- /dev/null +++ b/graph/incidents_graphml/3/32350020-9f48-11ee-b79d-9f7e35646416.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.174 + 100.64.13.174 + ["Exploiting Host","Exploiting Target"] + 0.81015625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.6 + 100.64.69.6 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.7.160 + 100.64.7.160 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1703084292 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32350020-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32350020-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32350020-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32350020-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32350020-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32350020-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32350020-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32350020-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32350020-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32350020-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32350020-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32350020-9f48-11ee-b79d-9f7e35646416 + + + diff --git a/graph/incidents_graphml/3/32359c60-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/3/32359c60-9f48-11ee-b79d-9f7e35646416.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12990345b532937182df813b89335135fa865f7b --- /dev/null +++ b/graph/incidents_graphml/3/32359c60-9f48-11ee-b79d-9f7e35646416.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.69.7 + 100.64.69.7 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1703084292 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32359c60-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32359c60-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32359c60-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32359c60-9f48-11ee-b79d-9f7e35646416 + + + diff --git a/graph/incidents_graphml/3/323de7b0-f96e-11ed-917d-d573a97593c4.graphml b/graph/incidents_graphml/3/323de7b0-f96e-11ed-917d-d573a97593c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edd7d22234e393654bf3b859cadff62693efbbe5 --- /dev/null +++ b/graph/incidents_graphml/3/323de7b0-f96e-11ed-917d-d573a97593c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.109 + 100.64.39.109 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684848720 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 323de7b0-f96e-11ed-917d-d573a97593c4 + + + diff --git a/graph/incidents_graphml/3/323f8730-27ed-11ed-95a8-93fe9a2e5fea.graphml b/graph/incidents_graphml/3/323f8730-27ed-11ed-95a8-93fe9a2e5fea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..657976252b9dabac757d8377b29a664d20b1918c --- /dev/null +++ b/graph/incidents_graphml/3/323f8730-27ed-11ed-95a8-93fe9a2e5fea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.27 + 100.64.51.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1661813522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 323f8730-27ed-11ed-95a8-93fe9a2e5fea + + + diff --git a/graph/incidents_graphml/3/324960d0-7a0c-11ee-9002-0de92ece484d.graphml b/graph/incidents_graphml/3/324960d0-7a0c-11ee-9002-0de92ece484d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5e7f3e777cedcbb824f40a8d6f2d98fa3434ca3 --- /dev/null +++ b/graph/incidents_graphml/3/324960d0-7a0c-11ee-9002-0de92ece484d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.193 + 100.64.45.193 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698990329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 324960d0-7a0c-11ee-9002-0de92ece484d + + + diff --git a/graph/incidents_graphml/3/3249fb40-77d6-11ee-8945-efc081163466.graphml b/graph/incidents_graphml/3/3249fb40-77d6-11ee-8945-efc081163466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..116a32735f473ccb950109cb2ef300d8a35c4035 --- /dev/null +++ b/graph/incidents_graphml/3/3249fb40-77d6-11ee-8945-efc081163466.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.155 + 100.64.27.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747234 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3249fb40-77d6-11ee-8945-efc081163466 + + + diff --git a/graph/incidents_graphml/3/324b1df0-152d-11ef-94b2-9fdc46810273.graphml b/graph/incidents_graphml/3/324b1df0-152d-11ef-94b2-9fdc46810273.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a66aefef0b9c12db87c2ebb45c51dcb81424162 --- /dev/null +++ b/graph/incidents_graphml/3/324b1df0-152d-11ef-94b2-9fdc46810273.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.10 + 100.64.90.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1716046933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 324b1df0-152d-11ef-94b2-9fdc46810273 + + + diff --git a/graph/incidents_graphml/3/324ce870-ace6-11ed-9c58-3fd78e20bcce.graphml b/graph/incidents_graphml/3/324ce870-ace6-11ed-9c58-3fd78e20bcce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f25c91c692d9ab411d9018a10f12a01466565d29 --- /dev/null +++ b/graph/incidents_graphml/3/324ce870-ace6-11ed-9c58-3fd78e20bcce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.143 + 100.64.91.143 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1676434020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 324ce870-ace6-11ed-9c58-3fd78e20bcce + + + diff --git a/graph/incidents_graphml/3/32523fa0-ace6-11ed-9c58-3fd78e20bcce.graphml b/graph/incidents_graphml/3/32523fa0-ace6-11ed-9c58-3fd78e20bcce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c9195af030956212fcc9fbddc39eded3c771aeb --- /dev/null +++ b/graph/incidents_graphml/3/32523fa0-ace6-11ed-9c58-3fd78e20bcce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.91.143 + 100.64.91.143 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676434020 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 32523fa0-ace6-11ed-9c58-3fd78e20bcce + + + diff --git a/graph/incidents_graphml/3/32536b80-f96e-11ed-917d-d573a97593c4.graphml b/graph/incidents_graphml/3/32536b80-f96e-11ed-917d-d573a97593c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3c502503ad46edf27d17b89891fbbd9bc809600 --- /dev/null +++ b/graph/incidents_graphml/3/32536b80-f96e-11ed-917d-d573a97593c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.39.109 + 100.64.39.109 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684848720 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 32536b80-f96e-11ed-917d-d573a97593c4 + + + diff --git a/graph/incidents_graphml/3/325763f0-1472-11ef-94ab-9b572b609cc3.graphml b/graph/incidents_graphml/3/325763f0-1472-11ef-94ab-9b572b609cc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..132940c864ee4cf6462d9e8d176275168b2f7cd2 --- /dev/null +++ b/graph/incidents_graphml/3/325763f0-1472-11ef-94ab-9b572b609cc3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.221 + 100.64.63.221 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715966617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 325763f0-1472-11ef-94ab-9b572b609cc3 + + + diff --git a/graph/incidents_graphml/3/325806d0-7a0c-11ee-9002-0de92ece484d.graphml b/graph/incidents_graphml/3/325806d0-7a0c-11ee-9002-0de92ece484d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c48ab97fdc1d3478fa6a90b01d9a64e5a2b0b4b --- /dev/null +++ b/graph/incidents_graphml/3/325806d0-7a0c-11ee-9002-0de92ece484d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.193 + 100.64.45.193 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698990329 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 325806d0-7a0c-11ee-9002-0de92ece484d + + + diff --git a/graph/incidents_graphml/3/3260c8d0-152d-11ef-94b2-9fdc46810273.graphml b/graph/incidents_graphml/3/3260c8d0-152d-11ef-94b2-9fdc46810273.graphml new file mode 100644 index 0000000000000000000000000000000000000000..706b5f404dc9925e8a6f81746efe8e4e70e1fa64 --- /dev/null +++ b/graph/incidents_graphml/3/3260c8d0-152d-11ef-94b2-9fdc46810273.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.90.10 + 100.64.90.10 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1716046933 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3260c8d0-152d-11ef-94b2-9fdc46810273 + + + diff --git a/graph/incidents_graphml/3/32630580-1602-11ee-b5b0-23eb7b8b596d.graphml b/graph/incidents_graphml/3/32630580-1602-11ee-b5b0-23eb7b8b596d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8a682d71fc72df03030ba5c6a6f86654722b420 --- /dev/null +++ b/graph/incidents_graphml/3/32630580-1602-11ee-b5b0-23eb7b8b596d.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.43 + 100.64.38.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.173 + 100.64.59.173 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.28 + 100.64.40.28 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687990918 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32630580-1602-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990918 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32630580-1602-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990918 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32630580-1602-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990918 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32630580-1602-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990918 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32630580-1602-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990918 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32630580-1602-11ee-b5b0-23eb7b8b596d + + + diff --git a/graph/incidents_graphml/3/32632890-77d6-11ee-8945-efc081163466.graphml b/graph/incidents_graphml/3/32632890-77d6-11ee-8945-efc081163466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7347b6acd013d9a2324715eca5c61bb11742535 --- /dev/null +++ b/graph/incidents_graphml/3/32632890-77d6-11ee-8945-efc081163466.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.155 + 100.64.27.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747234 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32632890-77d6-11ee-8945-efc081163466 + + + diff --git a/graph/incidents_graphml/3/32669770-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/3/32669770-9f48-11ee-b79d-9f7e35646416.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b5de51ccdb7cac82fecaab6842906efb9bd5169 --- /dev/null +++ b/graph/incidents_graphml/3/32669770-9f48-11ee-b79d-9f7e35646416.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.8 + 100.64.69.8 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1703084292 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 32669770-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084292 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 32669770-9f48-11ee-b79d-9f7e35646416 + + + diff --git a/graph/incidents_graphml/3/326af290-7a0c-11ee-9002-0de92ece484d.graphml b/graph/incidents_graphml/3/326af290-7a0c-11ee-9002-0de92ece484d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dcf9e246a6f512469e686cfb61624cd8ba5046a1 --- /dev/null +++ b/graph/incidents_graphml/3/326af290-7a0c-11ee-9002-0de92ece484d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.195 + USER-0015-1352.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698990330 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 326af290-7a0c-11ee-9002-0de92ece484d + + + diff --git a/graph/incidents_graphml/3/326b1300-1472-11ef-94ab-9b572b609cc3.graphml b/graph/incidents_graphml/3/326b1300-1472-11ef-94ab-9b572b609cc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49d4165cf8a5d7adb9951e83c0e65aa78e09605d --- /dev/null +++ b/graph/incidents_graphml/3/326b1300-1472-11ef-94ab-9b572b609cc3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.221 + 100.64.63.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715966617 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 326b1300-1472-11ef-94ab-9b572b609cc3 + + + diff --git a/graph/incidents_graphml/3/32714500-f6aa-11ec-86ed-01daccdabaa6.graphml b/graph/incidents_graphml/3/32714500-f6aa-11ec-86ed-01daccdabaa6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7e2cc87a30aa34e77ee9a75e77271f12f2bd027 --- /dev/null +++ b/graph/incidents_graphml/3/32714500-f6aa-11ec-86ed-01daccdabaa6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.29 + 100.64.74.29 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.30 + 100.64.74.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656397139 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32714500-f6aa-11ec-86ed-01daccdabaa6 + + + INCIDENT_LINK + 1656397139 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32714500-f6aa-11ec-86ed-01daccdabaa6 + + + diff --git a/graph/incidents_graphml/3/32779550-f96e-11ed-917d-d573a97593c4.graphml b/graph/incidents_graphml/3/32779550-f96e-11ed-917d-d573a97593c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e5982c447896fad029b6ebb997f1ec0951c48ca --- /dev/null +++ b/graph/incidents_graphml/3/32779550-f96e-11ed-917d-d573a97593c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.111 + 100.64.39.111 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684848720 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 32779550-f96e-11ed-917d-d573a97593c4 + + + diff --git a/graph/incidents_graphml/3/3296bbb0-77d6-11ee-8945-efc081163466.graphml b/graph/incidents_graphml/3/3296bbb0-77d6-11ee-8945-efc081163466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66675b67345905db5c5fc508e9e3ebfda84f9ed1 --- /dev/null +++ b/graph/incidents_graphml/3/3296bbb0-77d6-11ee-8945-efc081163466.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.155 + 100.64.27.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747235 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3296bbb0-77d6-11ee-8945-efc081163466 + + + diff --git a/graph/incidents_graphml/3/32a9ce80-77d6-11ee-8945-efc081163466.graphml b/graph/incidents_graphml/3/32a9ce80-77d6-11ee-8945-efc081163466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e14c1b312e07d0da7a89b36ddb5a697b7413d196 --- /dev/null +++ b/graph/incidents_graphml/3/32a9ce80-77d6-11ee-8945-efc081163466.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.155 + 100.64.27.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747235 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32a9ce80-77d6-11ee-8945-efc081163466 + + + diff --git a/graph/incidents_graphml/3/32b06000-7a0c-11ee-9002-0de92ece484d.graphml b/graph/incidents_graphml/3/32b06000-7a0c-11ee-9002-0de92ece484d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5508fc82b20b3ae344b0619111a26c808d9b0a27 --- /dev/null +++ b/graph/incidents_graphml/3/32b06000-7a0c-11ee-9002-0de92ece484d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.152 + 100.64.7.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698990330 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 32b06000-7a0c-11ee-9002-0de92ece484d + + + diff --git a/graph/incidents_graphml/3/32b2b150-dbb1-11ee-a665-15e5a5884e11.graphml b/graph/incidents_graphml/3/32b2b150-dbb1-11ee-a665-15e5a5884e11.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc5eb7adcd95b26d868ee4a59834216921a288a0 --- /dev/null +++ b/graph/incidents_graphml/3/32b2b150-dbb1-11ee-a665-15e5a5884e11.graphml @@ -0,0 +1,459 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.245 + 100.64.50.245 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.111 + 100.64.8.111 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.246 + 100.64.50.246 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.247 + 100.64.50.247 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.255 + 100.64.23.255 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.191 + 100.64.9.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.188 + 100.64.19.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.206 + 100.64.50.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.46 + 100.64.16.46 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.248 + 100.64.50.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.249 + 100.64.50.249 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726460 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32b2b150-dbb1-11ee-a665-15e5a5884e11 + + + diff --git a/graph/incidents_graphml/3/32bdcbb0-77d6-11ee-8945-efc081163466.graphml b/graph/incidents_graphml/3/32bdcbb0-77d6-11ee-8945-efc081163466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5da45b2e05e1e84adcedfd57406a0eddae09e31a --- /dev/null +++ b/graph/incidents_graphml/3/32bdcbb0-77d6-11ee-8945-efc081163466.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.155 + 100.64.27.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747235 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32bdcbb0-77d6-11ee-8945-efc081163466 + + + diff --git a/graph/incidents_graphml/3/32c1be80-1472-11ef-94ab-9b572b609cc3.graphml b/graph/incidents_graphml/3/32c1be80-1472-11ef-94ab-9b572b609cc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be599d82bd642336fb342d759e7d18f357ad8ef4 --- /dev/null +++ b/graph/incidents_graphml/3/32c1be80-1472-11ef-94ab-9b572b609cc3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.3 + 100.64.44.3 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715966618 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 32c1be80-1472-11ef-94ab-9b572b609cc3 + + + diff --git a/graph/incidents_graphml/3/32c1c520-7a0c-11ee-9002-0de92ece484d.graphml b/graph/incidents_graphml/3/32c1c520-7a0c-11ee-9002-0de92ece484d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..74e52dd84a51bd04c0416a31898b18db9222738e --- /dev/null +++ b/graph/incidents_graphml/3/32c1c520-7a0c-11ee-9002-0de92ece484d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.152 + 100.64.7.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698990330 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 32c1c520-7a0c-11ee-9002-0de92ece484d + + + diff --git a/graph/incidents_graphml/3/32d1f1c0-7a0c-11ee-9002-0de92ece484d.graphml b/graph/incidents_graphml/3/32d1f1c0-7a0c-11ee-9002-0de92ece484d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1343234f5cf297c25049f92413a08a48495840f0 --- /dev/null +++ b/graph/incidents_graphml/3/32d1f1c0-7a0c-11ee-9002-0de92ece484d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698990330 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32d1f1c0-7a0c-11ee-9002-0de92ece484d + + + diff --git a/graph/incidents_graphml/3/32d3c4b0-77d6-11ee-8945-efc081163466.graphml b/graph/incidents_graphml/3/32d3c4b0-77d6-11ee-8945-efc081163466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0890ed80fe9f98917e0bc4a9eba3c7cea522fc75 --- /dev/null +++ b/graph/incidents_graphml/3/32d3c4b0-77d6-11ee-8945-efc081163466.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.155 + 100.64.27.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747235 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 32d3c4b0-77d6-11ee-8945-efc081163466 + + + diff --git a/graph/incidents_graphml/3/32d8c0d0-7c83-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/32d8c0d0-7c83-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d546437a9303b8c27f419fa7f2a45e31bb54b44e --- /dev/null +++ b/graph/incidents_graphml/3/32d8c0d0-7c83-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.209 + 100.64.11.209 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699261343 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32d8c0d0-7c83-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/32df8c60-609c-11ee-a28d-59a2fed71cde.graphml b/graph/incidents_graphml/3/32df8c60-609c-11ee-a28d-59a2fed71cde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a611285708d8c82a1ff3c5ffaccbfce06dd01f84 --- /dev/null +++ b/graph/incidents_graphml/3/32df8c60-609c-11ee-a28d-59a2fed71cde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.131 + 100.64.27.131 + ["Exploiting Host"] + 0.8875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696193448 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 32df8c60-609c-11ee-a28d-59a2fed71cde + + + diff --git a/graph/incidents_graphml/3/32e9d7d0-7c83-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/32e9d7d0-7c83-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69a6a76be9a96ff20fc86d27e6c7c07ebd246d33 --- /dev/null +++ b/graph/incidents_graphml/3/32e9d7d0-7c83-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.209 + 100.64.11.209 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699261343 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 32e9d7d0-7c83-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/32eb4c10-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/3/32eb4c10-be91-11ed-9416-c54055a72e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d459e97d2df203befac456177dec1a4071207a7f --- /dev/null +++ b/graph/incidents_graphml/3/32eb4c10-be91-11ed-9416-c54055a72e53.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.102.172.170 + 10.102.172.170 + [] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.79.183 + 100.64.79.183 + ["Exploiting Target","Exploiting Host"] + 0.859375 + ["Precinct","Cisco Meraki Firewall","Meraki"] + + + HOST + 100.64.79.184 + 100.64.79.184 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki"] + + + INCIDENT_LINK + 1678376635 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 32eb4c10-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376635 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 32eb4c10-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376635 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 32eb4c10-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376635 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 32eb4c10-be91-11ed-9416-c54055a72e53 + + + diff --git a/graph/incidents_graphml/3/32eef5b0-609c-11ee-a28d-59a2fed71cde.graphml b/graph/incidents_graphml/3/32eef5b0-609c-11ee-a28d-59a2fed71cde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34021b14fccf6639836e3388abd7b49db5a5dd9c --- /dev/null +++ b/graph/incidents_graphml/3/32eef5b0-609c-11ee-a28d-59a2fed71cde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.33 + 100.64.62.33 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696193448 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 32eef5b0-609c-11ee-a28d-59a2fed71cde + + + diff --git a/graph/incidents_graphml/3/32fde9d0-609c-11ee-a28d-59a2fed71cde.graphml b/graph/incidents_graphml/3/32fde9d0-609c-11ee-a28d-59a2fed71cde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd988a032fa95fb471f26479cb64436370e8dd50 --- /dev/null +++ b/graph/incidents_graphml/3/32fde9d0-609c-11ee-a28d-59a2fed71cde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.33 + 100.64.62.33 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696193448 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 32fde9d0-609c-11ee-a28d-59a2fed71cde + + + diff --git a/graph/incidents_graphml/3/3300f690-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/3300f690-e0ce-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa5ddfe4a6c7cb3420f0b3f0866cfe9d9522047c --- /dev/null +++ b/graph/incidents_graphml/3/3300f690-e0ce-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.71 + 100.64.26.71 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710288671 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3300f690-e0ce-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/3/3310fca0-609c-11ee-a28d-59a2fed71cde.graphml b/graph/incidents_graphml/3/3310fca0-609c-11ee-a28d-59a2fed71cde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9c4e1472a8e763883656833f368fde7b00c0ba3 --- /dev/null +++ b/graph/incidents_graphml/3/3310fca0-609c-11ee-a28d-59a2fed71cde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.196 + 100.64.19.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696193448 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3310fca0-609c-11ee-a28d-59a2fed71cde + + + diff --git a/graph/incidents_graphml/3/33229620-294d-11ef-a020-fd333ff9534c.graphml b/graph/incidents_graphml/3/33229620-294d-11ef-a020-fd333ff9534c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40c602d543056b45cac844eccff549c6b6dba871 --- /dev/null +++ b/graph/incidents_graphml/3/33229620-294d-11ef-a020-fd333ff9534c.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.203 + 100.64.65.203 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.235 + 100.64.10.235 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.41 + 100.64.27.41 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.32 + 100.64.22.32 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718259701 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33229620-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259701 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33229620-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259701 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33229620-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259701 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33229620-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259701 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33229620-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259701 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33229620-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259701 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33229620-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259701 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33229620-294d-11ef-a020-fd333ff9534c + + + diff --git a/graph/incidents_graphml/3/33276330-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/3/33276330-2435-11ee-bc29-cfb067a56058.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3319ad5dd694dc5e028d5171cca2c50b928ca32a --- /dev/null +++ b/graph/incidents_graphml/3/33276330-2435-11ee-bc29-cfb067a56058.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.91 + 100.64.69.91 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1689552140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 33276330-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 33276330-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 33276330-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 33276330-2435-11ee-bc29-cfb067a56058 + + + diff --git a/graph/incidents_graphml/3/333e3670-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/3/333e3670-1c50-11ed-bd09-797a43d85ced.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8956c023704f22c31bc0e9f4969f5b742f5f9dd --- /dev/null +++ b/graph/incidents_graphml/3/333e3670-1c50-11ed-bd09-797a43d85ced.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.113 + 100.64.86.113 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1660536630 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 333e3670-1c50-11ed-bd09-797a43d85ced + + + diff --git a/graph/incidents_graphml/3/3342e310-5e20-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/3/3342e310-5e20-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69c486c6e4f09e602ec82d714c5b0ce70e21b59a --- /dev/null +++ b/graph/incidents_graphml/3/3342e310-5e20-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.235 + 100.64.53.235 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695920288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3342e310-5e20-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/3/3348e730-920d-11ee-afdd-6dc3cf6fdc52.graphml b/graph/incidents_graphml/3/3348e730-920d-11ee-afdd-6dc3cf6fdc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..003844d4c54db9573da4a9489981cac4f852fbaf --- /dev/null +++ b/graph/incidents_graphml/3/3348e730-920d-11ee-afdd-6dc3cf6fdc52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.25 + 100.64.22.25 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701629588 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3348e730-920d-11ee-afdd-6dc3cf6fdc52 + + + diff --git a/graph/incidents_graphml/3/334bad30-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/334bad30-9cb3-11ed-8977-e596d5530bb8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af2f0e623cbb13495158f8584cfd3fd639f2436d --- /dev/null +++ b/graph/incidents_graphml/3/334bad30-9cb3-11ed-8977-e596d5530bb8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1968.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.18 + 100.64.93.18 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1674652899 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 334bad30-9cb3-11ed-8977-e596d5530bb8 + + +