Upload per-incident GraphML sharded batch 20/27
Browse filesThis view is limited to 50 files because it contains too many changes. See raw diff
- graph/incidents_graphml/b/bdab66a0-3d0d-11ee-ba1f-812391e2855d.graphml +63 -0
- graph/incidents_graphml/b/bdb21760-311a-11ee-87a2-613e036775fd.graphml +387 -0
- graph/incidents_graphml/b/bdb25870-5bee-11ee-82a0-9da780b0dcc4.graphml +63 -0
- graph/incidents_graphml/b/bdb2b730-6c00-11ee-9973-9b86183b2cfc.graphml +63 -0
- graph/incidents_graphml/b/bdb6d7c0-131d-11ee-8854-7b8acd154f2f.graphml +63 -0
- graph/incidents_graphml/b/bdb75c00-a166-11ed-863f-a161c6cf34a1.graphml +113 -0
- graph/incidents_graphml/b/bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f.graphml +825 -0
- graph/incidents_graphml/b/bdbd55c0-2d5b-11ee-9400-61c78ce5335d.graphml +63 -0
- graph/incidents_graphml/b/bdbdb370-ba66-11ed-ace2-c7d81fb15087.graphml +63 -0
- graph/incidents_graphml/b/bdc10f10-6c00-11ee-9973-9b86183b2cfc.graphml +107 -0
- graph/incidents_graphml/b/bdc19ab0-5bee-11ee-82a0-9da780b0dcc4.graphml +63 -0
- graph/incidents_graphml/b/bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
- graph/incidents_graphml/b/bdccd150-3d0d-11ee-ba1f-812391e2855d.graphml +63 -0
- graph/incidents_graphml/b/bdd07860-6c00-11ee-9973-9b86183b2cfc.graphml +63 -0
- graph/incidents_graphml/b/bdea14f0-41fd-11ee-b97c-f959f41b9d07.graphml +63 -0
- graph/incidents_graphml/b/bdeefa80-00b9-11ef-8b56-b9c5ad676a8a.graphml +149 -0
- graph/incidents_graphml/b/bdf6e800-f613-11ed-a3d6-ad85d59eee66.graphml +113 -0
- graph/incidents_graphml/b/bdf9cc60-41fd-11ee-b97c-f959f41b9d07.graphml +63 -0
- graph/incidents_graphml/b/bdf9cc70-a070-11ee-8eba-81c30328b488.graphml +63 -0
- graph/incidents_graphml/b/bdfa2e80-6cba-11ed-88c8-935f200141c8.graphml +77 -0
- graph/incidents_graphml/b/bdfa37b0-2d5b-11ee-9400-61c78ce5335d.graphml +63 -0
- graph/incidents_graphml/b/be02f970-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
- graph/incidents_graphml/b/be045ed0-3b73-11ef-b1e4-3da31b742190.graphml +293 -0
- graph/incidents_graphml/b/be074240-3d0d-11ee-ba1f-812391e2855d.graphml +63 -0
- graph/incidents_graphml/b/be083320-f9fb-11ee-a91e-b385ff48b568.graphml +63 -0
- graph/incidents_graphml/b/be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
- graph/incidents_graphml/b/be10b0b0-4a09-11ee-8bf8-c1f4992fd587.graphml +359 -0
- graph/incidents_graphml/b/be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
- graph/incidents_graphml/b/be226350-3e29-11ee-b681-89e3497f1d7e.graphml +63 -0
- graph/incidents_graphml/b/be256290-1c3c-11ed-9dc4-eb234c0496d2.graphml +77 -0
- graph/incidents_graphml/b/be289e00-cf6a-11ee-91bc-e1cf8103bf6f.graphml +783 -0
- graph/incidents_graphml/b/be28cd70-f613-11ed-a3d6-ad85d59eee66.graphml +113 -0
- graph/incidents_graphml/b/be29bb50-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
- graph/incidents_graphml/b/be2edc40-2d5b-11ee-9400-61c78ce5335d.graphml +63 -0
- graph/incidents_graphml/b/be33c870-3e29-11ee-b681-89e3497f1d7e.graphml +63 -0
- graph/incidents_graphml/b/be35f050-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
- graph/incidents_graphml/b/be3a7230-a060-11ee-9181-41cbe26a7b16.graphml +77 -0
- graph/incidents_graphml/b/be3d1510-2f74-11ee-8001-3b5fed8c9dd3.graphml +63 -0
- graph/incidents_graphml/b/be3e4440-117d-11ee-b107-2764325d5a51.graphml +77 -0
- graph/incidents_graphml/b/be43c370-edf0-11ee-aef3-7fbaf9d61c41.graphml +63 -0
- graph/incidents_graphml/b/be4906a0-ffe3-11ee-b8be-512e5047d566.graphml +63 -0
- graph/incidents_graphml/b/be4d2280-ebef-11ec-9679-75d3d6184114.graphml +77 -0
- graph/incidents_graphml/b/be583f00-0d16-11ee-9392-932bfd273540.graphml +135 -0
- graph/incidents_graphml/b/be5a98c0-f6a1-11ee-8b23-bde5dce38992.graphml +63 -0
- graph/incidents_graphml/b/be5f2330-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
- graph/incidents_graphml/b/be62e490-2d5b-11ee-9400-61c78ce5335d.graphml +63 -0
- graph/incidents_graphml/b/be662630-21fe-11ef-a065-0d11f2930c39.graphml +63 -0
- graph/incidents_graphml/b/be6b96c0-edf0-11ee-aef3-7fbaf9d61c41.graphml +63 -0
- graph/incidents_graphml/b/be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
- graph/incidents_graphml/b/be6e3f00-6c00-11ee-9973-9b86183b2cfc.graphml +63 -0
graph/incidents_graphml/b/bdab66a0-3d0d-11ee-ba1f-812391e2855d.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.31.182.227</data>
|
| 35 |
+
<data key="n_hostname">172.31.182.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="49d6a2a3-25dc-11ee-a096-c7bd5c661fc8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.66.30</data>
|
| 43 |
+
<data key="n_hostname">100.64.66.30</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2761" target="49d6a2a3-25dc-11ee-a096-c7bd5c661fc8">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1692283972</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">bdab66a0-3d0d-11ee-ba1f-812391e2855d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdb21760-311a-11ee-87a2-613e036775fd.graphml
ADDED
|
@@ -0,0 +1,387 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="bc01cf50-311a-11ee-ac64-bb65677f617e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.58.64</data>
|
| 35 |
+
<data key="n_hostname">100.64.58.64</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.200.243</data>
|
| 43 |
+
<data key="n_hostname">172.30.200.243</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.9208984375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="77e4e920-0e05-11ee-83c2-430175bac8b6">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.58.65</data>
|
| 51 |
+
<data key="n_hostname">100.64.58.65</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="3971ef62-259f-11ee-a116-af2c3a0e2f1a">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.58.66</data>
|
| 59 |
+
<data key="n_hostname">100.64.58.66</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="69420c40-2705-11ee-96f7-ef9658dca3bb">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.58.67</data>
|
| 67 |
+
<data key="n_hostname">100.64.58.67</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="f2420741-12b8-11ee-9c7e-07083ed7c247">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.58.68</data>
|
| 75 |
+
<data key="n_hostname">USER-0015-1427.example.internal</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="ff15d616-3106-11ee-ad50-4366968404b1">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.58.69</data>
|
| 83 |
+
<data key="n_hostname">100.64.58.69</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="31021680-2517-11ee-bbc8-db39ada6e4de">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.58.70</data>
|
| 91 |
+
<data key="n_hostname">100.64.58.70</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="2bd33551-0626-11ee-b19f-ed665a42340f">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">172.23.86.34</data>
|
| 99 |
+
<data key="n_hostname">172.23.86.34</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="ab0431c3-0d8e-11ee-96aa-451df7608a05">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.11.207</data>
|
| 107 |
+
<data key="n_hostname">100.64.11.207</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="051448f2-310f-11ee-9ac0-efae50d8c2ef">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.58.71</data>
|
| 115 |
+
<data key="n_hostname">100.64.58.71</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<edge id="e1" source="bc01cf50-311a-11ee-ac64-bb65677f617e" target="HOST-2706">
|
| 121 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 122 |
+
<data key="e_timestamp">1690970141</data>
|
| 123 |
+
<data key="e_label_binary">malicious</data>
|
| 124 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 125 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 126 |
+
<data key="e_mo_name">Data Theft</data>
|
| 127 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 128 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 129 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 130 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 131 |
+
<data key="e_disposition">Disrupted</data>
|
| 132 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 133 |
+
</edge>
|
| 134 |
+
<edge id="e2" source="HOST-2706" target="bc01cf50-311a-11ee-ac64-bb65677f617e">
|
| 135 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 136 |
+
<data key="e_timestamp">1690970141</data>
|
| 137 |
+
<data key="e_label_binary">malicious</data>
|
| 138 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 139 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 140 |
+
<data key="e_mo_name">Data Theft</data>
|
| 141 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 142 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 143 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 144 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 145 |
+
<data key="e_disposition">Disrupted</data>
|
| 146 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 147 |
+
</edge>
|
| 148 |
+
<edge id="e3" source="77e4e920-0e05-11ee-83c2-430175bac8b6" target="HOST-2706">
|
| 149 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 150 |
+
<data key="e_timestamp">1690970141</data>
|
| 151 |
+
<data key="e_label_binary">malicious</data>
|
| 152 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 153 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 154 |
+
<data key="e_mo_name">Data Theft</data>
|
| 155 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 156 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 157 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 158 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 159 |
+
<data key="e_disposition">Disrupted</data>
|
| 160 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 161 |
+
</edge>
|
| 162 |
+
<edge id="e4" source="HOST-2706" target="77e4e920-0e05-11ee-83c2-430175bac8b6">
|
| 163 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 164 |
+
<data key="e_timestamp">1690970141</data>
|
| 165 |
+
<data key="e_label_binary">malicious</data>
|
| 166 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 167 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 168 |
+
<data key="e_mo_name">Data Theft</data>
|
| 169 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 170 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 171 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 172 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 173 |
+
<data key="e_disposition">Disrupted</data>
|
| 174 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 175 |
+
</edge>
|
| 176 |
+
<edge id="e5" source="3971ef62-259f-11ee-a116-af2c3a0e2f1a" target="HOST-2706">
|
| 177 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 178 |
+
<data key="e_timestamp">1690970141</data>
|
| 179 |
+
<data key="e_label_binary">malicious</data>
|
| 180 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 181 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 182 |
+
<data key="e_mo_name">Data Theft</data>
|
| 183 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 184 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 185 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 186 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 187 |
+
<data key="e_disposition">Disrupted</data>
|
| 188 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 189 |
+
</edge>
|
| 190 |
+
<edge id="e6" source="HOST-2706" target="3971ef62-259f-11ee-a116-af2c3a0e2f1a">
|
| 191 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 192 |
+
<data key="e_timestamp">1690970141</data>
|
| 193 |
+
<data key="e_label_binary">malicious</data>
|
| 194 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 195 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 196 |
+
<data key="e_mo_name">Data Theft</data>
|
| 197 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 198 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 199 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 200 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 201 |
+
<data key="e_disposition">Disrupted</data>
|
| 202 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 203 |
+
</edge>
|
| 204 |
+
<edge id="e7" source="69420c40-2705-11ee-96f7-ef9658dca3bb" target="HOST-2706">
|
| 205 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 206 |
+
<data key="e_timestamp">1690970141</data>
|
| 207 |
+
<data key="e_label_binary">malicious</data>
|
| 208 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 209 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 210 |
+
<data key="e_mo_name">Data Theft</data>
|
| 211 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 212 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 213 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 214 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 215 |
+
<data key="e_disposition">Disrupted</data>
|
| 216 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 217 |
+
</edge>
|
| 218 |
+
<edge id="e8" source="HOST-2706" target="69420c40-2705-11ee-96f7-ef9658dca3bb">
|
| 219 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 220 |
+
<data key="e_timestamp">1690970141</data>
|
| 221 |
+
<data key="e_label_binary">malicious</data>
|
| 222 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 223 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 224 |
+
<data key="e_mo_name">Data Theft</data>
|
| 225 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 226 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 227 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 228 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 229 |
+
<data key="e_disposition">Disrupted</data>
|
| 230 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 231 |
+
</edge>
|
| 232 |
+
<edge id="e9" source="f2420741-12b8-11ee-9c7e-07083ed7c247" target="HOST-2706">
|
| 233 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 234 |
+
<data key="e_timestamp">1690970141</data>
|
| 235 |
+
<data key="e_label_binary">malicious</data>
|
| 236 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 237 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 238 |
+
<data key="e_mo_name">Data Theft</data>
|
| 239 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 240 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 241 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 242 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 243 |
+
<data key="e_disposition">Disrupted</data>
|
| 244 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 245 |
+
</edge>
|
| 246 |
+
<edge id="e10" source="HOST-2706" target="f2420741-12b8-11ee-9c7e-07083ed7c247">
|
| 247 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 248 |
+
<data key="e_timestamp">1690970141</data>
|
| 249 |
+
<data key="e_label_binary">malicious</data>
|
| 250 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 251 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 252 |
+
<data key="e_mo_name">Data Theft</data>
|
| 253 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 254 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 255 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 256 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 257 |
+
<data key="e_disposition">Disrupted</data>
|
| 258 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 259 |
+
</edge>
|
| 260 |
+
<edge id="e11" source="ff15d616-3106-11ee-ad50-4366968404b1" target="HOST-2706">
|
| 261 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 262 |
+
<data key="e_timestamp">1690970141</data>
|
| 263 |
+
<data key="e_label_binary">malicious</data>
|
| 264 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 265 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 266 |
+
<data key="e_mo_name">Data Theft</data>
|
| 267 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 268 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 269 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 270 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 271 |
+
<data key="e_disposition">Disrupted</data>
|
| 272 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 273 |
+
</edge>
|
| 274 |
+
<edge id="e12" source="HOST-2706" target="ff15d616-3106-11ee-ad50-4366968404b1">
|
| 275 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 276 |
+
<data key="e_timestamp">1690970141</data>
|
| 277 |
+
<data key="e_label_binary">malicious</data>
|
| 278 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 279 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 280 |
+
<data key="e_mo_name">Data Theft</data>
|
| 281 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 282 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 283 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 284 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 285 |
+
<data key="e_disposition">Disrupted</data>
|
| 286 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 287 |
+
</edge>
|
| 288 |
+
<edge id="e13" source="31021680-2517-11ee-bbc8-db39ada6e4de" target="HOST-2706">
|
| 289 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 290 |
+
<data key="e_timestamp">1690970141</data>
|
| 291 |
+
<data key="e_label_binary">malicious</data>
|
| 292 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 293 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 294 |
+
<data key="e_mo_name">Data Theft</data>
|
| 295 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 296 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 297 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 298 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 299 |
+
<data key="e_disposition">Disrupted</data>
|
| 300 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 301 |
+
</edge>
|
| 302 |
+
<edge id="e14" source="HOST-2706" target="31021680-2517-11ee-bbc8-db39ada6e4de">
|
| 303 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 304 |
+
<data key="e_timestamp">1690970141</data>
|
| 305 |
+
<data key="e_label_binary">malicious</data>
|
| 306 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 307 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 308 |
+
<data key="e_mo_name">Data Theft</data>
|
| 309 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 310 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 311 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 312 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 313 |
+
<data key="e_disposition">Disrupted</data>
|
| 314 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 315 |
+
</edge>
|
| 316 |
+
<edge id="e15" source="77e4e920-0e05-11ee-83c2-430175bac8b6" target="HOST-2717">
|
| 317 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 318 |
+
<data key="e_timestamp">1690970141</data>
|
| 319 |
+
<data key="e_label_binary">malicious</data>
|
| 320 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 321 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 322 |
+
<data key="e_mo_name">Data Theft</data>
|
| 323 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 324 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 325 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 326 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 327 |
+
<data key="e_disposition">Disrupted</data>
|
| 328 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 329 |
+
</edge>
|
| 330 |
+
<edge id="e16" source="HOST-2706" target="HOST-3343">
|
| 331 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 332 |
+
<data key="e_timestamp">1690970141</data>
|
| 333 |
+
<data key="e_label_binary">malicious</data>
|
| 334 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 335 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 336 |
+
<data key="e_mo_name">Data Theft</data>
|
| 337 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 338 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 339 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 340 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 341 |
+
<data key="e_disposition">Disrupted</data>
|
| 342 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 343 |
+
</edge>
|
| 344 |
+
<edge id="e17" source="HOST-3343" target="HOST-2706">
|
| 345 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 346 |
+
<data key="e_timestamp">1690970141</data>
|
| 347 |
+
<data key="e_label_binary">malicious</data>
|
| 348 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 349 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 350 |
+
<data key="e_mo_name">Data Theft</data>
|
| 351 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 352 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 353 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 354 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 355 |
+
<data key="e_disposition">Disrupted</data>
|
| 356 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 357 |
+
</edge>
|
| 358 |
+
<edge id="e18" source="051448f2-310f-11ee-9ac0-efae50d8c2ef" target="HOST-2706">
|
| 359 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 360 |
+
<data key="e_timestamp">1690970141</data>
|
| 361 |
+
<data key="e_label_binary">malicious</data>
|
| 362 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 363 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 364 |
+
<data key="e_mo_name">Data Theft</data>
|
| 365 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 366 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 367 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 368 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 369 |
+
<data key="e_disposition">Disrupted</data>
|
| 370 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 371 |
+
</edge>
|
| 372 |
+
<edge id="e19" source="HOST-2706" target="051448f2-310f-11ee-9ac0-efae50d8c2ef">
|
| 373 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 374 |
+
<data key="e_timestamp">1690970141</data>
|
| 375 |
+
<data key="e_label_binary">malicious</data>
|
| 376 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 377 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 378 |
+
<data key="e_mo_name">Data Theft</data>
|
| 379 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 380 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 381 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 382 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 383 |
+
<data key="e_disposition">Disrupted</data>
|
| 384 |
+
<data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
|
| 385 |
+
</edge>
|
| 386 |
+
</graph>
|
| 387 |
+
</graphml>
|
graph/incidents_graphml/b/bdb25870-5bee-11ee-82a0-9da780b0dcc4.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ebb52292-0624-11ee-a48a-ff0b3de2e266">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.12.202</data>
|
| 35 |
+
<data key="n_hostname">100.64.12.202</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.16.232.220</data>
|
| 43 |
+
<data key="n_hostname">172.16.232.220</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-3462" target="HOST-2748">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1695679143</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">bdb25870-5bee-11ee-82a0-9da780b0dcc4</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdb2b730-6c00-11ee-9973-9b86183b2cfc.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="c288b2a3-537d-11ee-a2a3-bfa286121a5f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.74.211.215</data>
|
| 35 |
+
<data key="n_hostname">10.74.211.215</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="bcc215a3-6c00-11ee-b94f-d7e01e6af6af">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.90.14</data>
|
| 43 |
+
<data key="n_hostname">100.64.90.14</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17154" target="HOST-17873">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697446093</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">bdb2b730-6c00-11ee-9973-9b86183b2cfc</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdb6d7c0-131d-11ee-8854-7b8acd154f2f.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.31.6.172</data>
|
| 35 |
+
<data key="n_hostname">172.31.6.172</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="62676423-0ab7-11ee-8866-d3f889652490">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.53.34</data>
|
| 43 |
+
<data key="n_hostname">100.64.53.34</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2757" target="HOST-9166">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1687672895</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">bdb6d7c0-131d-11ee-8854-7b8acd154f2f</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdb75c00-a166-11ed-863f-a161c6cf34a1.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5dd003a0-9d88-11ed-8ff2-3593b92fed96">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">192.168.107.156</data>
|
| 35 |
+
<data key="n_hostname">192.168.107.156</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="58bc8855-a136-11ed-96d6-9b6ff1c0106e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.86.211</data>
|
| 43 |
+
<data key="n_hostname">100.64.86.211</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="e1403cf1-9d88-11ed-a0d9-bbd531499cbc">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">192.168.17.89</data>
|
| 51 |
+
<data key="n_hostname">192.168.17.89</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="5dd003a0-9d88-11ed-8ff2-3593b92fed96" target="58bc8855-a136-11ed-96d6-9b6ff1c0106e">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1675169816</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.7</data>
|
| 61 |
+
<data key="e_suspicion_score">0.4375</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Disrupted</data>
|
| 68 |
+
<data key="e_incident_id">bdb75c00-a166-11ed-863f-a161c6cf34a1</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="58bc8855-a136-11ed-96d6-9b6ff1c0106e" target="5dd003a0-9d88-11ed-8ff2-3593b92fed96">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1675169816</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.7</data>
|
| 75 |
+
<data key="e_suspicion_score">0.4375</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">bdb75c00-a166-11ed-863f-a161c6cf34a1</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="e1403cf1-9d88-11ed-a0d9-bbd531499cbc" target="58bc8855-a136-11ed-96d6-9b6ff1c0106e">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1675169816</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.7</data>
|
| 89 |
+
<data key="e_suspicion_score">0.4375</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">bdb75c00-a166-11ed-863f-a161c6cf34a1</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="58bc8855-a136-11ed-96d6-9b6ff1c0106e" target="e1403cf1-9d88-11ed-a0d9-bbd531499cbc">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1675169816</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.7</data>
|
| 103 |
+
<data key="e_suspicion_score">0.4375</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">bdb75c00-a166-11ed-863f-a161c6cf34a1</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/b/bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f.graphml
ADDED
|
@@ -0,0 +1,825 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ec44df74-0624-11ee-9792-13ac4ddb104c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.52.86</data>
|
| 35 |
+
<data key="n_hostname">100.64.52.86</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.22.127.96</data>
|
| 43 |
+
<data key="n_hostname">172.22.127.96</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="829dbde4-cf3b-11ee-8bb2-c5ff1802c79c">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.52.87</data>
|
| 51 |
+
<data key="n_hostname">100.64.52.87</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="badb7d41-0624-11ee-a48a-ff0b3de2e266">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.52.88</data>
|
| 59 |
+
<data key="n_hostname">100.64.52.88</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="4774eb40-0627-11ee-8860-f951c26910c1">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.13.219</data>
|
| 67 |
+
<data key="n_hostname">100.64.13.219</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="19aca8f0-cf3b-11ee-a48b-75f5badf3578">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.52.89</data>
|
| 75 |
+
<data key="n_hostname">100.64.52.89</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">172.16.232.220</data>
|
| 83 |
+
<data key="n_hostname">172.16.232.220</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.25</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="5afed340-aabb-11ee-8161-899d5b9a9801">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.52.90</data>
|
| 91 |
+
<data key="n_hostname">100.64.52.90</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.25</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="2f0075e5-0625-11ee-bea9-5f52a09eb73a">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">172.18.96.192</data>
|
| 99 |
+
<data key="n_hostname">172.18.96.192</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.25</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="4c26c575-0625-11ee-a360-0d0424c09388">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.52.91</data>
|
| 107 |
+
<data key="n_hostname">100.64.52.91</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.25</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="f2a24d22-062a-11ee-aa9e-a71a1423ad66">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.52.92</data>
|
| 115 |
+
<data key="n_hostname">100.64.52.92</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.25</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="a2de90e0-aabd-11ee-aaef-21351945c4a2">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">100.64.24.74</data>
|
| 123 |
+
<data key="n_hostname">100.64.24.74</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.25</data>
|
| 126 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="260096f3-062a-11ee-94f6-0d301f382bbb">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">172.30.174.172</data>
|
| 131 |
+
<data key="n_hostname">172.30.174.172</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.25</data>
|
| 134 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="46178052-0636-11ee-973d-c176e777c94a">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">100.64.37.239</data>
|
| 139 |
+
<data key="n_hostname">100.64.37.239</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.25</data>
|
| 142 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<node id="51c3bc80-290d-11ee-99ed-1755463db0de">
|
| 145 |
+
<data key="n_type">HOST</data>
|
| 146 |
+
<data key="n_ip">100.64.52.93</data>
|
| 147 |
+
<data key="n_hostname">USER-0015-1396.example.internal</data>
|
| 148 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 149 |
+
<data key="n_suspicion_score">0.25</data>
|
| 150 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 151 |
+
</node>
|
| 152 |
+
<node id="e2d98983-06a2-11ee-bd15-7bc0b6ea3f89">
|
| 153 |
+
<data key="n_type">HOST</data>
|
| 154 |
+
<data key="n_ip">100.64.23.63</data>
|
| 155 |
+
<data key="n_hostname">100.64.23.63</data>
|
| 156 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 157 |
+
<data key="n_suspicion_score">0.25</data>
|
| 158 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 159 |
+
</node>
|
| 160 |
+
<node id="0458ba10-062e-11ee-b010-f122865b5659">
|
| 161 |
+
<data key="n_type">HOST</data>
|
| 162 |
+
<data key="n_ip">172.26.23.117</data>
|
| 163 |
+
<data key="n_hostname">172.26.23.117</data>
|
| 164 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 165 |
+
<data key="n_suspicion_score">0.25</data>
|
| 166 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 167 |
+
</node>
|
| 168 |
+
<node id="38091ca0-cf3d-11ee-bdf1-43d1affd7388">
|
| 169 |
+
<data key="n_type">HOST</data>
|
| 170 |
+
<data key="n_ip">100.64.51.170</data>
|
| 171 |
+
<data key="n_hostname">100.64.51.170</data>
|
| 172 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 173 |
+
<data key="n_suspicion_score">0.25</data>
|
| 174 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 175 |
+
</node>
|
| 176 |
+
<node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
|
| 177 |
+
<data key="n_type">HOST</data>
|
| 178 |
+
<data key="n_ip">172.27.202.53</data>
|
| 179 |
+
<data key="n_hostname">172.27.202.53</data>
|
| 180 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 181 |
+
<data key="n_suspicion_score">0.25</data>
|
| 182 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 183 |
+
</node>
|
| 184 |
+
<node id="e2ab7ff0-cf69-11ee-b6ee-a173b75d092a">
|
| 185 |
+
<data key="n_type">HOST</data>
|
| 186 |
+
<data key="n_ip">100.64.52.94</data>
|
| 187 |
+
<data key="n_hostname">100.64.52.94</data>
|
| 188 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 189 |
+
<data key="n_suspicion_score">0.25</data>
|
| 190 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 191 |
+
</node>
|
| 192 |
+
<node id="8e420a70-bc12-11ee-9be3-bbac05820e8c">
|
| 193 |
+
<data key="n_type">HOST</data>
|
| 194 |
+
<data key="n_ip">100.64.22.14</data>
|
| 195 |
+
<data key="n_hostname">100.64.22.14</data>
|
| 196 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 197 |
+
<data key="n_suspicion_score">0.25</data>
|
| 198 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 199 |
+
</node>
|
| 200 |
+
<node id="18fbb580-0827-11ee-9cde-69be8eab0946">
|
| 201 |
+
<data key="n_type">HOST</data>
|
| 202 |
+
<data key="n_ip">100.64.8.150</data>
|
| 203 |
+
<data key="n_hostname">HOST-2906</data>
|
| 204 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 205 |
+
<data key="n_suspicion_score">0.25</data>
|
| 206 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 207 |
+
</node>
|
| 208 |
+
<edge id="e1" source="ec44df74-0624-11ee-9792-13ac4ddb104c" target="HOST-2726">
|
| 209 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 210 |
+
<data key="e_timestamp">1708376785</data>
|
| 211 |
+
<data key="e_label_binary">malicious</data>
|
| 212 |
+
<data key="e_label_confidence">0.7</data>
|
| 213 |
+
<data key="e_suspicion_score">0.25</data>
|
| 214 |
+
<data key="e_mo_name">Data Theft</data>
|
| 215 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 216 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 217 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 218 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 219 |
+
<data key="e_disposition">Unprocessed</data>
|
| 220 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 221 |
+
</edge>
|
| 222 |
+
<edge id="e2" source="HOST-2726" target="ec44df74-0624-11ee-9792-13ac4ddb104c">
|
| 223 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 224 |
+
<data key="e_timestamp">1708376785</data>
|
| 225 |
+
<data key="e_label_binary">malicious</data>
|
| 226 |
+
<data key="e_label_confidence">0.7</data>
|
| 227 |
+
<data key="e_suspicion_score">0.25</data>
|
| 228 |
+
<data key="e_mo_name">Data Theft</data>
|
| 229 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 230 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 231 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 232 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 233 |
+
<data key="e_disposition">Unprocessed</data>
|
| 234 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 235 |
+
</edge>
|
| 236 |
+
<edge id="e3" source="829dbde4-cf3b-11ee-8bb2-c5ff1802c79c" target="HOST-2726">
|
| 237 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 238 |
+
<data key="e_timestamp">1708376785</data>
|
| 239 |
+
<data key="e_label_binary">malicious</data>
|
| 240 |
+
<data key="e_label_confidence">0.7</data>
|
| 241 |
+
<data key="e_suspicion_score">0.25</data>
|
| 242 |
+
<data key="e_mo_name">Data Theft</data>
|
| 243 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 244 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 245 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 246 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 247 |
+
<data key="e_disposition">Unprocessed</data>
|
| 248 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 249 |
+
</edge>
|
| 250 |
+
<edge id="e4" source="HOST-2726" target="829dbde4-cf3b-11ee-8bb2-c5ff1802c79c">
|
| 251 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 252 |
+
<data key="e_timestamp">1708376785</data>
|
| 253 |
+
<data key="e_label_binary">malicious</data>
|
| 254 |
+
<data key="e_label_confidence">0.7</data>
|
| 255 |
+
<data key="e_suspicion_score">0.25</data>
|
| 256 |
+
<data key="e_mo_name">Data Theft</data>
|
| 257 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 258 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 259 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 260 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 261 |
+
<data key="e_disposition">Unprocessed</data>
|
| 262 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 263 |
+
</edge>
|
| 264 |
+
<edge id="e5" source="badb7d41-0624-11ee-a48a-ff0b3de2e266" target="HOST-2726">
|
| 265 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 266 |
+
<data key="e_timestamp">1708376785</data>
|
| 267 |
+
<data key="e_label_binary">malicious</data>
|
| 268 |
+
<data key="e_label_confidence">0.7</data>
|
| 269 |
+
<data key="e_suspicion_score">0.25</data>
|
| 270 |
+
<data key="e_mo_name">Data Theft</data>
|
| 271 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 272 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 273 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 274 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 275 |
+
<data key="e_disposition">Unprocessed</data>
|
| 276 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 277 |
+
</edge>
|
| 278 |
+
<edge id="e6" source="HOST-2726" target="badb7d41-0624-11ee-a48a-ff0b3de2e266">
|
| 279 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 280 |
+
<data key="e_timestamp">1708376785</data>
|
| 281 |
+
<data key="e_label_binary">malicious</data>
|
| 282 |
+
<data key="e_label_confidence">0.7</data>
|
| 283 |
+
<data key="e_suspicion_score">0.25</data>
|
| 284 |
+
<data key="e_mo_name">Data Theft</data>
|
| 285 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 286 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 287 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 288 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 289 |
+
<data key="e_disposition">Unprocessed</data>
|
| 290 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 291 |
+
</edge>
|
| 292 |
+
<edge id="e7" source="HOST-2726" target="HOST-3617">
|
| 293 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 294 |
+
<data key="e_timestamp">1708376785</data>
|
| 295 |
+
<data key="e_label_binary">malicious</data>
|
| 296 |
+
<data key="e_label_confidence">0.7</data>
|
| 297 |
+
<data key="e_suspicion_score">0.25</data>
|
| 298 |
+
<data key="e_mo_name">Data Theft</data>
|
| 299 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 300 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 301 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 302 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 303 |
+
<data key="e_disposition">Unprocessed</data>
|
| 304 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 305 |
+
</edge>
|
| 306 |
+
<edge id="e8" source="HOST-3617" target="HOST-2726">
|
| 307 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 308 |
+
<data key="e_timestamp">1708376785</data>
|
| 309 |
+
<data key="e_label_binary">malicious</data>
|
| 310 |
+
<data key="e_label_confidence">0.7</data>
|
| 311 |
+
<data key="e_suspicion_score">0.25</data>
|
| 312 |
+
<data key="e_mo_name">Data Theft</data>
|
| 313 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 314 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 315 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 316 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 317 |
+
<data key="e_disposition">Unprocessed</data>
|
| 318 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 319 |
+
</edge>
|
| 320 |
+
<edge id="e9" source="19aca8f0-cf3b-11ee-a48b-75f5badf3578" target="HOST-2748">
|
| 321 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 322 |
+
<data key="e_timestamp">1708376785</data>
|
| 323 |
+
<data key="e_label_binary">malicious</data>
|
| 324 |
+
<data key="e_label_confidence">0.7</data>
|
| 325 |
+
<data key="e_suspicion_score">0.25</data>
|
| 326 |
+
<data key="e_mo_name">Data Theft</data>
|
| 327 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 328 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 329 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 330 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 331 |
+
<data key="e_disposition">Unprocessed</data>
|
| 332 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 333 |
+
</edge>
|
| 334 |
+
<edge id="e10" source="HOST-2748" target="19aca8f0-cf3b-11ee-a48b-75f5badf3578">
|
| 335 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 336 |
+
<data key="e_timestamp">1708376785</data>
|
| 337 |
+
<data key="e_label_binary">malicious</data>
|
| 338 |
+
<data key="e_label_confidence">0.7</data>
|
| 339 |
+
<data key="e_suspicion_score">0.25</data>
|
| 340 |
+
<data key="e_mo_name">Data Theft</data>
|
| 341 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 342 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 343 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 344 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 345 |
+
<data key="e_disposition">Unprocessed</data>
|
| 346 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 347 |
+
</edge>
|
| 348 |
+
<edge id="e11" source="5afed340-aabb-11ee-8161-899d5b9a9801" target="HOST-2715">
|
| 349 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 350 |
+
<data key="e_timestamp">1708376785</data>
|
| 351 |
+
<data key="e_label_binary">malicious</data>
|
| 352 |
+
<data key="e_label_confidence">0.7</data>
|
| 353 |
+
<data key="e_suspicion_score">0.25</data>
|
| 354 |
+
<data key="e_mo_name">Data Theft</data>
|
| 355 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 356 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 357 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 358 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 359 |
+
<data key="e_disposition">Unprocessed</data>
|
| 360 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 361 |
+
</edge>
|
| 362 |
+
<edge id="e12" source="HOST-2715" target="5afed340-aabb-11ee-8161-899d5b9a9801">
|
| 363 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 364 |
+
<data key="e_timestamp">1708376785</data>
|
| 365 |
+
<data key="e_label_binary">malicious</data>
|
| 366 |
+
<data key="e_label_confidence">0.7</data>
|
| 367 |
+
<data key="e_suspicion_score">0.25</data>
|
| 368 |
+
<data key="e_mo_name">Data Theft</data>
|
| 369 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 370 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 371 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 372 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 373 |
+
<data key="e_disposition">Unprocessed</data>
|
| 374 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 375 |
+
</edge>
|
| 376 |
+
<edge id="e13" source="19aca8f0-cf3b-11ee-a48b-75f5badf3578" target="HOST-2715">
|
| 377 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 378 |
+
<data key="e_timestamp">1708376785</data>
|
| 379 |
+
<data key="e_label_binary">malicious</data>
|
| 380 |
+
<data key="e_label_confidence">0.7</data>
|
| 381 |
+
<data key="e_suspicion_score">0.25</data>
|
| 382 |
+
<data key="e_mo_name">Data Theft</data>
|
| 383 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 384 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 385 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 386 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 387 |
+
<data key="e_disposition">Unprocessed</data>
|
| 388 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 389 |
+
</edge>
|
| 390 |
+
<edge id="e14" source="HOST-2715" target="19aca8f0-cf3b-11ee-a48b-75f5badf3578">
|
| 391 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 392 |
+
<data key="e_timestamp">1708376785</data>
|
| 393 |
+
<data key="e_label_binary">malicious</data>
|
| 394 |
+
<data key="e_label_confidence">0.7</data>
|
| 395 |
+
<data key="e_suspicion_score">0.25</data>
|
| 396 |
+
<data key="e_mo_name">Data Theft</data>
|
| 397 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 398 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 399 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 400 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 401 |
+
<data key="e_disposition">Unprocessed</data>
|
| 402 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 403 |
+
</edge>
|
| 404 |
+
<edge id="e15" source="4c26c575-0625-11ee-a360-0d0424c09388" target="HOST-2715">
|
| 405 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 406 |
+
<data key="e_timestamp">1708376785</data>
|
| 407 |
+
<data key="e_label_binary">malicious</data>
|
| 408 |
+
<data key="e_label_confidence">0.7</data>
|
| 409 |
+
<data key="e_suspicion_score">0.25</data>
|
| 410 |
+
<data key="e_mo_name">Data Theft</data>
|
| 411 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 412 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 413 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 414 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 415 |
+
<data key="e_disposition">Unprocessed</data>
|
| 416 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 417 |
+
</edge>
|
| 418 |
+
<edge id="e16" source="HOST-2715" target="4c26c575-0625-11ee-a360-0d0424c09388">
|
| 419 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 420 |
+
<data key="e_timestamp">1708376785</data>
|
| 421 |
+
<data key="e_label_binary">malicious</data>
|
| 422 |
+
<data key="e_label_confidence">0.7</data>
|
| 423 |
+
<data key="e_suspicion_score">0.25</data>
|
| 424 |
+
<data key="e_mo_name">Data Theft</data>
|
| 425 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 426 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 427 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 428 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 429 |
+
<data key="e_disposition">Unprocessed</data>
|
| 430 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 431 |
+
</edge>
|
| 432 |
+
<edge id="e17" source="f2a24d22-062a-11ee-aa9e-a71a1423ad66" target="HOST-2715">
|
| 433 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 434 |
+
<data key="e_timestamp">1708376785</data>
|
| 435 |
+
<data key="e_label_binary">malicious</data>
|
| 436 |
+
<data key="e_label_confidence">0.7</data>
|
| 437 |
+
<data key="e_suspicion_score">0.25</data>
|
| 438 |
+
<data key="e_mo_name">Data Theft</data>
|
| 439 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 440 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 441 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 442 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 443 |
+
<data key="e_disposition">Unprocessed</data>
|
| 444 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 445 |
+
</edge>
|
| 446 |
+
<edge id="e18" source="HOST-2715" target="f2a24d22-062a-11ee-aa9e-a71a1423ad66">
|
| 447 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 448 |
+
<data key="e_timestamp">1708376785</data>
|
| 449 |
+
<data key="e_label_binary">malicious</data>
|
| 450 |
+
<data key="e_label_confidence">0.7</data>
|
| 451 |
+
<data key="e_suspicion_score">0.25</data>
|
| 452 |
+
<data key="e_mo_name">Data Theft</data>
|
| 453 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 454 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 455 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 456 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 457 |
+
<data key="e_disposition">Unprocessed</data>
|
| 458 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 459 |
+
</edge>
|
| 460 |
+
<edge id="e19" source="a2de90e0-aabd-11ee-aaef-21351945c4a2" target="HOST-2946">
|
| 461 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 462 |
+
<data key="e_timestamp">1708376785</data>
|
| 463 |
+
<data key="e_label_binary">malicious</data>
|
| 464 |
+
<data key="e_label_confidence">0.7</data>
|
| 465 |
+
<data key="e_suspicion_score">0.25</data>
|
| 466 |
+
<data key="e_mo_name">Data Theft</data>
|
| 467 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 468 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 469 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 470 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 471 |
+
<data key="e_disposition">Unprocessed</data>
|
| 472 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 473 |
+
</edge>
|
| 474 |
+
<edge id="e20" source="HOST-2946" target="a2de90e0-aabd-11ee-aaef-21351945c4a2">
|
| 475 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 476 |
+
<data key="e_timestamp">1708376785</data>
|
| 477 |
+
<data key="e_label_binary">malicious</data>
|
| 478 |
+
<data key="e_label_confidence">0.7</data>
|
| 479 |
+
<data key="e_suspicion_score">0.25</data>
|
| 480 |
+
<data key="e_mo_name">Data Theft</data>
|
| 481 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 482 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 483 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 484 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 485 |
+
<data key="e_disposition">Unprocessed</data>
|
| 486 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 487 |
+
</edge>
|
| 488 |
+
<edge id="e21" source="19aca8f0-cf3b-11ee-a48b-75f5badf3578" target="HOST-2946">
|
| 489 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 490 |
+
<data key="e_timestamp">1708376785</data>
|
| 491 |
+
<data key="e_label_binary">malicious</data>
|
| 492 |
+
<data key="e_label_confidence">0.7</data>
|
| 493 |
+
<data key="e_suspicion_score">0.25</data>
|
| 494 |
+
<data key="e_mo_name">Data Theft</data>
|
| 495 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 496 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 497 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 498 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 499 |
+
<data key="e_disposition">Unprocessed</data>
|
| 500 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 501 |
+
</edge>
|
| 502 |
+
<edge id="e22" source="HOST-2946" target="19aca8f0-cf3b-11ee-a48b-75f5badf3578">
|
| 503 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 504 |
+
<data key="e_timestamp">1708376785</data>
|
| 505 |
+
<data key="e_label_binary">malicious</data>
|
| 506 |
+
<data key="e_label_confidence">0.7</data>
|
| 507 |
+
<data key="e_suspicion_score">0.25</data>
|
| 508 |
+
<data key="e_mo_name">Data Theft</data>
|
| 509 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 510 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 511 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 512 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 513 |
+
<data key="e_disposition">Unprocessed</data>
|
| 514 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 515 |
+
</edge>
|
| 516 |
+
<edge id="e23" source="HOST-7533" target="HOST-2748">
|
| 517 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 518 |
+
<data key="e_timestamp">1708376785</data>
|
| 519 |
+
<data key="e_label_binary">malicious</data>
|
| 520 |
+
<data key="e_label_confidence">0.7</data>
|
| 521 |
+
<data key="e_suspicion_score">0.25</data>
|
| 522 |
+
<data key="e_mo_name">Data Theft</data>
|
| 523 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 524 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 525 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 526 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 527 |
+
<data key="e_disposition">Unprocessed</data>
|
| 528 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 529 |
+
</edge>
|
| 530 |
+
<edge id="e24" source="HOST-2748" target="HOST-7533">
|
| 531 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 532 |
+
<data key="e_timestamp">1708376785</data>
|
| 533 |
+
<data key="e_label_binary">malicious</data>
|
| 534 |
+
<data key="e_label_confidence">0.7</data>
|
| 535 |
+
<data key="e_suspicion_score">0.25</data>
|
| 536 |
+
<data key="e_mo_name">Data Theft</data>
|
| 537 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 538 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 539 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 540 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 541 |
+
<data key="e_disposition">Unprocessed</data>
|
| 542 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 543 |
+
</edge>
|
| 544 |
+
<edge id="e25" source="829dbde4-cf3b-11ee-8bb2-c5ff1802c79c" target="HOST-2748">
|
| 545 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 546 |
+
<data key="e_timestamp">1708376785</data>
|
| 547 |
+
<data key="e_label_binary">malicious</data>
|
| 548 |
+
<data key="e_label_confidence">0.7</data>
|
| 549 |
+
<data key="e_suspicion_score">0.25</data>
|
| 550 |
+
<data key="e_mo_name">Data Theft</data>
|
| 551 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 552 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 553 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 554 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 555 |
+
<data key="e_disposition">Unprocessed</data>
|
| 556 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 557 |
+
</edge>
|
| 558 |
+
<edge id="e26" source="HOST-2748" target="829dbde4-cf3b-11ee-8bb2-c5ff1802c79c">
|
| 559 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 560 |
+
<data key="e_timestamp">1708376785</data>
|
| 561 |
+
<data key="e_label_binary">malicious</data>
|
| 562 |
+
<data key="e_label_confidence">0.7</data>
|
| 563 |
+
<data key="e_suspicion_score">0.25</data>
|
| 564 |
+
<data key="e_mo_name">Data Theft</data>
|
| 565 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 566 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 567 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 568 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 569 |
+
<data key="e_disposition">Unprocessed</data>
|
| 570 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 571 |
+
</edge>
|
| 572 |
+
<edge id="e27" source="HOST-2726" target="51c3bc80-290d-11ee-99ed-1755463db0de">
|
| 573 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 574 |
+
<data key="e_timestamp">1708376785</data>
|
| 575 |
+
<data key="e_label_binary">malicious</data>
|
| 576 |
+
<data key="e_label_confidence">0.7</data>
|
| 577 |
+
<data key="e_suspicion_score">0.25</data>
|
| 578 |
+
<data key="e_mo_name">Data Theft</data>
|
| 579 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 580 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 581 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 582 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 583 |
+
<data key="e_disposition">Unprocessed</data>
|
| 584 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 585 |
+
</edge>
|
| 586 |
+
<edge id="e28" source="HOST-4907" target="HOST-2824">
|
| 587 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 588 |
+
<data key="e_timestamp">1708376785</data>
|
| 589 |
+
<data key="e_label_binary">malicious</data>
|
| 590 |
+
<data key="e_label_confidence">0.7</data>
|
| 591 |
+
<data key="e_suspicion_score">0.25</data>
|
| 592 |
+
<data key="e_mo_name">Data Theft</data>
|
| 593 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 594 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 595 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 596 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 597 |
+
<data key="e_disposition">Unprocessed</data>
|
| 598 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 599 |
+
</edge>
|
| 600 |
+
<edge id="e29" source="HOST-2824" target="HOST-4907">
|
| 601 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 602 |
+
<data key="e_timestamp">1708376785</data>
|
| 603 |
+
<data key="e_label_binary">malicious</data>
|
| 604 |
+
<data key="e_label_confidence">0.7</data>
|
| 605 |
+
<data key="e_suspicion_score">0.25</data>
|
| 606 |
+
<data key="e_mo_name">Data Theft</data>
|
| 607 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 608 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 609 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 610 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 611 |
+
<data key="e_disposition">Unprocessed</data>
|
| 612 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 613 |
+
</edge>
|
| 614 |
+
<edge id="e30" source="19aca8f0-cf3b-11ee-a48b-75f5badf3578" target="HOST-2824">
|
| 615 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 616 |
+
<data key="e_timestamp">1708376785</data>
|
| 617 |
+
<data key="e_label_binary">malicious</data>
|
| 618 |
+
<data key="e_label_confidence">0.7</data>
|
| 619 |
+
<data key="e_suspicion_score">0.25</data>
|
| 620 |
+
<data key="e_mo_name">Data Theft</data>
|
| 621 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 622 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 623 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 624 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 625 |
+
<data key="e_disposition">Unprocessed</data>
|
| 626 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 627 |
+
</edge>
|
| 628 |
+
<edge id="e31" source="HOST-2824" target="19aca8f0-cf3b-11ee-a48b-75f5badf3578">
|
| 629 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 630 |
+
<data key="e_timestamp">1708376785</data>
|
| 631 |
+
<data key="e_label_binary">malicious</data>
|
| 632 |
+
<data key="e_label_confidence">0.7</data>
|
| 633 |
+
<data key="e_suspicion_score">0.25</data>
|
| 634 |
+
<data key="e_mo_name">Data Theft</data>
|
| 635 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 636 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 637 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 638 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 639 |
+
<data key="e_disposition">Unprocessed</data>
|
| 640 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 641 |
+
</edge>
|
| 642 |
+
<edge id="e32" source="HOST-8947" target="HOST-2703">
|
| 643 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 644 |
+
<data key="e_timestamp">1708376785</data>
|
| 645 |
+
<data key="e_label_binary">malicious</data>
|
| 646 |
+
<data key="e_label_confidence">0.7</data>
|
| 647 |
+
<data key="e_suspicion_score">0.25</data>
|
| 648 |
+
<data key="e_mo_name">Data Theft</data>
|
| 649 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 650 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 651 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 652 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 653 |
+
<data key="e_disposition">Unprocessed</data>
|
| 654 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 655 |
+
</edge>
|
| 656 |
+
<edge id="e33" source="HOST-2703" target="HOST-8947">
|
| 657 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 658 |
+
<data key="e_timestamp">1708376785</data>
|
| 659 |
+
<data key="e_label_binary">malicious</data>
|
| 660 |
+
<data key="e_label_confidence">0.7</data>
|
| 661 |
+
<data key="e_suspicion_score">0.25</data>
|
| 662 |
+
<data key="e_mo_name">Data Theft</data>
|
| 663 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 664 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 665 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 666 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 667 |
+
<data key="e_disposition">Unprocessed</data>
|
| 668 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 669 |
+
</edge>
|
| 670 |
+
<edge id="e34" source="e2ab7ff0-cf69-11ee-b6ee-a173b75d092a" target="HOST-2703">
|
| 671 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 672 |
+
<data key="e_timestamp">1708376785</data>
|
| 673 |
+
<data key="e_label_binary">malicious</data>
|
| 674 |
+
<data key="e_label_confidence">0.7</data>
|
| 675 |
+
<data key="e_suspicion_score">0.25</data>
|
| 676 |
+
<data key="e_mo_name">Data Theft</data>
|
| 677 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 678 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 679 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 680 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 681 |
+
<data key="e_disposition">Unprocessed</data>
|
| 682 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 683 |
+
</edge>
|
| 684 |
+
<edge id="e35" source="HOST-2703" target="e2ab7ff0-cf69-11ee-b6ee-a173b75d092a">
|
| 685 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 686 |
+
<data key="e_timestamp">1708376785</data>
|
| 687 |
+
<data key="e_label_binary">malicious</data>
|
| 688 |
+
<data key="e_label_confidence">0.7</data>
|
| 689 |
+
<data key="e_suspicion_score">0.25</data>
|
| 690 |
+
<data key="e_mo_name">Data Theft</data>
|
| 691 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 692 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 693 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 694 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 695 |
+
<data key="e_disposition">Unprocessed</data>
|
| 696 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 697 |
+
</edge>
|
| 698 |
+
<edge id="e36" source="19aca8f0-cf3b-11ee-a48b-75f5badf3578" target="HOST-2703">
|
| 699 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 700 |
+
<data key="e_timestamp">1708376785</data>
|
| 701 |
+
<data key="e_label_binary">malicious</data>
|
| 702 |
+
<data key="e_label_confidence">0.7</data>
|
| 703 |
+
<data key="e_suspicion_score">0.25</data>
|
| 704 |
+
<data key="e_mo_name">Data Theft</data>
|
| 705 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 706 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 707 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 708 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 709 |
+
<data key="e_disposition">Unprocessed</data>
|
| 710 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 711 |
+
</edge>
|
| 712 |
+
<edge id="e37" source="HOST-2703" target="19aca8f0-cf3b-11ee-a48b-75f5badf3578">
|
| 713 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 714 |
+
<data key="e_timestamp">1708376785</data>
|
| 715 |
+
<data key="e_label_binary">malicious</data>
|
| 716 |
+
<data key="e_label_confidence">0.7</data>
|
| 717 |
+
<data key="e_suspicion_score">0.25</data>
|
| 718 |
+
<data key="e_mo_name">Data Theft</data>
|
| 719 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 720 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 721 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 722 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 723 |
+
<data key="e_disposition">Unprocessed</data>
|
| 724 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 725 |
+
</edge>
|
| 726 |
+
<edge id="e38" source="HOST-4750" target="HOST-2748">
|
| 727 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 728 |
+
<data key="e_timestamp">1708376785</data>
|
| 729 |
+
<data key="e_label_binary">malicious</data>
|
| 730 |
+
<data key="e_label_confidence">0.7</data>
|
| 731 |
+
<data key="e_suspicion_score">0.25</data>
|
| 732 |
+
<data key="e_mo_name">Data Theft</data>
|
| 733 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 734 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 735 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 736 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 737 |
+
<data key="e_disposition">Unprocessed</data>
|
| 738 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 739 |
+
</edge>
|
| 740 |
+
<edge id="e39" source="HOST-2748" target="HOST-4750">
|
| 741 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 742 |
+
<data key="e_timestamp">1708376785</data>
|
| 743 |
+
<data key="e_label_binary">malicious</data>
|
| 744 |
+
<data key="e_label_confidence">0.7</data>
|
| 745 |
+
<data key="e_suspicion_score">0.25</data>
|
| 746 |
+
<data key="e_mo_name">Data Theft</data>
|
| 747 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 748 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 749 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 750 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 751 |
+
<data key="e_disposition">Unprocessed</data>
|
| 752 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 753 |
+
</edge>
|
| 754 |
+
<edge id="e40" source="HOST-2726" target="HOST-2913">
|
| 755 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 756 |
+
<data key="e_timestamp">1708376785</data>
|
| 757 |
+
<data key="e_label_binary">malicious</data>
|
| 758 |
+
<data key="e_label_confidence">0.7</data>
|
| 759 |
+
<data key="e_suspicion_score">0.25</data>
|
| 760 |
+
<data key="e_mo_name">Data Theft</data>
|
| 761 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 762 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 763 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 764 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 765 |
+
<data key="e_disposition">Unprocessed</data>
|
| 766 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 767 |
+
</edge>
|
| 768 |
+
<edge id="e41" source="51c3bc80-290d-11ee-99ed-1755463db0de" target="HOST-2715">
|
| 769 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 770 |
+
<data key="e_timestamp">1708376785</data>
|
| 771 |
+
<data key="e_label_binary">malicious</data>
|
| 772 |
+
<data key="e_label_confidence">0.7</data>
|
| 773 |
+
<data key="e_suspicion_score">0.25</data>
|
| 774 |
+
<data key="e_mo_name">Data Theft</data>
|
| 775 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 776 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 777 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 778 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 779 |
+
<data key="e_disposition">Unprocessed</data>
|
| 780 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 781 |
+
</edge>
|
| 782 |
+
<edge id="e42" source="HOST-2715" target="51c3bc80-290d-11ee-99ed-1755463db0de">
|
| 783 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 784 |
+
<data key="e_timestamp">1708376785</data>
|
| 785 |
+
<data key="e_label_binary">malicious</data>
|
| 786 |
+
<data key="e_label_confidence">0.7</data>
|
| 787 |
+
<data key="e_suspicion_score">0.25</data>
|
| 788 |
+
<data key="e_mo_name">Data Theft</data>
|
| 789 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 790 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 791 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 792 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 793 |
+
<data key="e_disposition">Unprocessed</data>
|
| 794 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 795 |
+
</edge>
|
| 796 |
+
<edge id="e43" source="HOST-4907" target="HOST-2748">
|
| 797 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 798 |
+
<data key="e_timestamp">1708376785</data>
|
| 799 |
+
<data key="e_label_binary">malicious</data>
|
| 800 |
+
<data key="e_label_confidence">0.7</data>
|
| 801 |
+
<data key="e_suspicion_score">0.25</data>
|
| 802 |
+
<data key="e_mo_name">Data Theft</data>
|
| 803 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 804 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 805 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 806 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 807 |
+
<data key="e_disposition">Unprocessed</data>
|
| 808 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 809 |
+
</edge>
|
| 810 |
+
<edge id="e44" source="HOST-2748" target="HOST-4907">
|
| 811 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 812 |
+
<data key="e_timestamp">1708376785</data>
|
| 813 |
+
<data key="e_label_binary">malicious</data>
|
| 814 |
+
<data key="e_label_confidence">0.7</data>
|
| 815 |
+
<data key="e_suspicion_score">0.25</data>
|
| 816 |
+
<data key="e_mo_name">Data Theft</data>
|
| 817 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 818 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 819 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 820 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 821 |
+
<data key="e_disposition">Unprocessed</data>
|
| 822 |
+
<data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 823 |
+
</edge>
|
| 824 |
+
</graph>
|
| 825 |
+
</graphml>
|
graph/incidents_graphml/b/bdbd55c0-2d5b-11ee-9400-61c78ce5335d.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="41b00552-0627-11ee-bb6d-91e4d286acbc">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.19.51</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-1418.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2bd33551-0626-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.23.86.34</data>
|
| 43 |
+
<data key="n_hostname">172.23.86.34</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="41b00552-0627-11ee-bb6d-91e4d286acbc" target="HOST-2717">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1690558254</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">bdbd55c0-2d5b-11ee-9400-61c78ce5335d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdbdb370-ba66-11ed-ace2-c7d81fb15087.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ae4c91c2-b725-11ed-85c4-817a11d31ebb">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.75.230</data>
|
| 35 |
+
<data key="n_hostname">100.64.75.230</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="f5eedb42-9d8b-11ed-9ba1-69c845a45d44">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.72.200</data>
|
| 43 |
+
<data key="n_hostname">100.64.72.200</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="ae4c91c2-b725-11ed-85c4-817a11d31ebb" target="f5eedb42-9d8b-11ed-9ba1-69c845a45d44">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1677918595</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">bdbdb370-ba66-11ed-ace2-c7d81fb15087</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdc10f10-6c00-11ee-9973-9b86183b2cfc.graphml
ADDED
|
@@ -0,0 +1,107 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="d9f63494-3aef-11ee-879d-95b58c5de2cb">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.57.130</data>
|
| 35 |
+
<data key="n_hostname">100.64.57.130</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9ff29330-0627-11ee-ad14-25a724519715">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.113.78.104</data>
|
| 43 |
+
<data key="n_hostname">10.113.78.104</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="c288b2a3-537d-11ee-a2a3-bfa286121a5f">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">10.74.211.215</data>
|
| 51 |
+
<data key="n_hostname">10.74.211.215</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="c6935663-3529-11ee-9075-d1549a39f834">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">10.184.211.180</data>
|
| 59 |
+
<data key="n_hostname">10.184.211.180</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<edge id="e1" source="d9f63494-3aef-11ee-879d-95b58c5de2cb" target="HOST-16999">
|
| 65 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 66 |
+
<data key="e_timestamp">1697446093</data>
|
| 67 |
+
<data key="e_label_binary">malicious</data>
|
| 68 |
+
<data key="e_label_confidence">0.7</data>
|
| 69 |
+
<data key="e_suspicion_score">0.25</data>
|
| 70 |
+
<data key="e_mo_name">Data Theft</data>
|
| 71 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 72 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 73 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 74 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 75 |
+
<data key="e_disposition">Unprocessed</data>
|
| 76 |
+
<data key="e_incident_id">bdc10f10-6c00-11ee-9973-9b86183b2cfc</data>
|
| 77 |
+
</edge>
|
| 78 |
+
<edge id="e2" source="d9f63494-3aef-11ee-879d-95b58c5de2cb" target="HOST-17154">
|
| 79 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 80 |
+
<data key="e_timestamp">1697446093</data>
|
| 81 |
+
<data key="e_label_binary">malicious</data>
|
| 82 |
+
<data key="e_label_confidence">0.7</data>
|
| 83 |
+
<data key="e_suspicion_score">0.25</data>
|
| 84 |
+
<data key="e_mo_name">Data Theft</data>
|
| 85 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 86 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 87 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 88 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 89 |
+
<data key="e_disposition">Unprocessed</data>
|
| 90 |
+
<data key="e_incident_id">bdc10f10-6c00-11ee-9973-9b86183b2cfc</data>
|
| 91 |
+
</edge>
|
| 92 |
+
<edge id="e3" source="d9f63494-3aef-11ee-879d-95b58c5de2cb" target="HOST-17115">
|
| 93 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 94 |
+
<data key="e_timestamp">1697446093</data>
|
| 95 |
+
<data key="e_label_binary">malicious</data>
|
| 96 |
+
<data key="e_label_confidence">0.7</data>
|
| 97 |
+
<data key="e_suspicion_score">0.25</data>
|
| 98 |
+
<data key="e_mo_name">Data Theft</data>
|
| 99 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 100 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 101 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 102 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 103 |
+
<data key="e_disposition">Unprocessed</data>
|
| 104 |
+
<data key="e_incident_id">bdc10f10-6c00-11ee-9973-9b86183b2cfc</data>
|
| 105 |
+
</edge>
|
| 106 |
+
</graph>
|
| 107 |
+
</graphml>
|
graph/incidents_graphml/b/bdc19ab0-5bee-11ee-82a0-9da780b0dcc4.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.16.232.220</data>
|
| 35 |
+
<data key="n_hostname">172.16.232.220</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="ebb52292-0624-11ee-a48a-ff0b3de2e266">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.12.202</data>
|
| 43 |
+
<data key="n_hostname">100.64.12.202</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2748" target="HOST-3462">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1695679143</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">bdc19ab0-5bee-11ee-82a0-9da780b0dcc4</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.208.219</data>
|
| 35 |
+
<data key="n_hostname">172.30.208.219</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e27810c3-5700-11ee-a932-a17fa9a09b5b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.33.53</data>
|
| 43 |
+
<data key="n_hostname">100.64.33.53</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2823" target="HOST-6308">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1707951583</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdccd150-3d0d-11ee-ba1f-812391e2855d.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="bfe7c193-0624-11ee-8860-f951c26910c1">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.66.32</data>
|
| 35 |
+
<data key="n_hostname">100.64.66.32</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.168.48</data>
|
| 43 |
+
<data key="n_hostname">172.30.168.48</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="bfe7c193-0624-11ee-8860-f951c26910c1" target="HOST-2842">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1692283972</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">bdccd150-3d0d-11ee-ba1f-812391e2855d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdd07860-6c00-11ee-9973-9b86183b2cfc.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="9ff29330-0627-11ee-ad14-25a724519715">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.113.78.104</data>
|
| 35 |
+
<data key="n_hostname">10.113.78.104</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="d9f63494-3aef-11ee-879d-95b58c5de2cb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.57.130</data>
|
| 43 |
+
<data key="n_hostname">100.64.57.130</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-16999" target="HOST-17874">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697446093</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">bdd07860-6c00-11ee-9973-9b86183b2cfc</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdea14f0-41fd-11ee-b97c-f959f41b9d07.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b0d69f82-1c24-11ee-8b27-872193f89e2b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.66.133</data>
|
| 35 |
+
<data key="n_hostname">100.64.66.133</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.191.229</data>
|
| 43 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="b0d69f82-1c24-11ee-8b27-872193f89e2b" target="HOST-2839">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1692826856</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">bdea14f0-41fd-11ee-b97c-f959f41b9d07</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdeefa80-00b9-11ef-8b56-b9c5ad676a8a.graphml
ADDED
|
@@ -0,0 +1,149 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="188fd9d2-06b2-11ee-be12-2bca84bf8424">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.70.168</data>
|
| 35 |
+
<data key="n_hostname">100.64.70.168</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.49375</data>
|
| 38 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="af00dcda-0625-11ee-872d-37355cbb58d3">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.68.38</data>
|
| 43 |
+
<data key="n_hostname">100.64.68.38</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.746875</data>
|
| 46 |
+
<data key="n_products">["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="d5efe9e4-9689-11ee-81a8-6b6681623387">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.70.93</data>
|
| 51 |
+
<data key="n_hostname">100.64.70.93</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.49375</data>
|
| 54 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="896b2261-2a64-11ee-a681-7bc82f570d8b">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.70.169</data>
|
| 59 |
+
<data key="n_hostname">USER-0015-1596.example.internal</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.49375</data>
|
| 62 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<edge id="e1" source="188fd9d2-06b2-11ee-be12-2bca84bf8424" target="HOST-11397">
|
| 65 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 66 |
+
<data key="e_timestamp">1713798322</data>
|
| 67 |
+
<data key="e_label_binary">malicious</data>
|
| 68 |
+
<data key="e_label_confidence">0.746875</data>
|
| 69 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 70 |
+
<data key="e_mo_name">Data Theft</data>
|
| 71 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 72 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 73 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 74 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 75 |
+
<data key="e_disposition">Disrupted</data>
|
| 76 |
+
<data key="e_incident_id">bdeefa80-00b9-11ef-8b56-b9c5ad676a8a</data>
|
| 77 |
+
</edge>
|
| 78 |
+
<edge id="e2" source="HOST-11397" target="188fd9d2-06b2-11ee-be12-2bca84bf8424">
|
| 79 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 80 |
+
<data key="e_timestamp">1713798322</data>
|
| 81 |
+
<data key="e_label_binary">malicious</data>
|
| 82 |
+
<data key="e_label_confidence">0.746875</data>
|
| 83 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 84 |
+
<data key="e_mo_name">Data Theft</data>
|
| 85 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 86 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 87 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 88 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 89 |
+
<data key="e_disposition">Disrupted</data>
|
| 90 |
+
<data key="e_incident_id">bdeefa80-00b9-11ef-8b56-b9c5ad676a8a</data>
|
| 91 |
+
</edge>
|
| 92 |
+
<edge id="e3" source="HOST-12397" target="HOST-11397">
|
| 93 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 94 |
+
<data key="e_timestamp">1713798322</data>
|
| 95 |
+
<data key="e_label_binary">malicious</data>
|
| 96 |
+
<data key="e_label_confidence">0.746875</data>
|
| 97 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 98 |
+
<data key="e_mo_name">Data Theft</data>
|
| 99 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 100 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 101 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 102 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 103 |
+
<data key="e_disposition">Disrupted</data>
|
| 104 |
+
<data key="e_incident_id">bdeefa80-00b9-11ef-8b56-b9c5ad676a8a</data>
|
| 105 |
+
</edge>
|
| 106 |
+
<edge id="e4" source="HOST-11397" target="HOST-12397">
|
| 107 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 108 |
+
<data key="e_timestamp">1713798322</data>
|
| 109 |
+
<data key="e_label_binary">malicious</data>
|
| 110 |
+
<data key="e_label_confidence">0.746875</data>
|
| 111 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 112 |
+
<data key="e_mo_name">Data Theft</data>
|
| 113 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 114 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 115 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 116 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 117 |
+
<data key="e_disposition">Disrupted</data>
|
| 118 |
+
<data key="e_incident_id">bdeefa80-00b9-11ef-8b56-b9c5ad676a8a</data>
|
| 119 |
+
</edge>
|
| 120 |
+
<edge id="e5" source="896b2261-2a64-11ee-a681-7bc82f570d8b" target="HOST-11397">
|
| 121 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 122 |
+
<data key="e_timestamp">1713798322</data>
|
| 123 |
+
<data key="e_label_binary">malicious</data>
|
| 124 |
+
<data key="e_label_confidence">0.746875</data>
|
| 125 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 126 |
+
<data key="e_mo_name">Data Theft</data>
|
| 127 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 128 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 129 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 130 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 131 |
+
<data key="e_disposition">Disrupted</data>
|
| 132 |
+
<data key="e_incident_id">bdeefa80-00b9-11ef-8b56-b9c5ad676a8a</data>
|
| 133 |
+
</edge>
|
| 134 |
+
<edge id="e6" source="HOST-11397" target="896b2261-2a64-11ee-a681-7bc82f570d8b">
|
| 135 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 136 |
+
<data key="e_timestamp">1713798322</data>
|
| 137 |
+
<data key="e_label_binary">malicious</data>
|
| 138 |
+
<data key="e_label_confidence">0.746875</data>
|
| 139 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 140 |
+
<data key="e_mo_name">Data Theft</data>
|
| 141 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 142 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 143 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 144 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 145 |
+
<data key="e_disposition">Disrupted</data>
|
| 146 |
+
<data key="e_incident_id">bdeefa80-00b9-11ef-8b56-b9c5ad676a8a</data>
|
| 147 |
+
</edge>
|
| 148 |
+
</graph>
|
| 149 |
+
</graphml>
|
graph/incidents_graphml/b/bdf6e800-f613-11ed-a3d6-ad85d59eee66.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="7867e660-bed5-11ed-93a9-8102b7634ad4">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.48.65</data>
|
| 35 |
+
<data key="n_hostname">100.64.48.65</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9405cae1-9d9c-11ed-8ca6-bfaecb56e6a3">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.71.119</data>
|
| 43 |
+
<data key="n_hostname">100.64.71.119</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="38973341-f52d-11ed-b653-b754f0ae64ce">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.4.2</data>
|
| 51 |
+
<data key="n_hostname">100.64.4.2</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="7867e660-bed5-11ed-93a9-8102b7634ad4" target="9405cae1-9d9c-11ed-8ca6-bfaecb56e6a3">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1684480017</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 61 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Disrupted</data>
|
| 68 |
+
<data key="e_incident_id">bdf6e800-f613-11ed-a3d6-ad85d59eee66</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="9405cae1-9d9c-11ed-8ca6-bfaecb56e6a3" target="7867e660-bed5-11ed-93a9-8102b7634ad4">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1684480017</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 75 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">bdf6e800-f613-11ed-a3d6-ad85d59eee66</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="38973341-f52d-11ed-b653-b754f0ae64ce" target="9405cae1-9d9c-11ed-8ca6-bfaecb56e6a3">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1684480017</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 89 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">bdf6e800-f613-11ed-a3d6-ad85d59eee66</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="9405cae1-9d9c-11ed-8ca6-bfaecb56e6a3" target="38973341-f52d-11ed-b653-b754f0ae64ce">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1684480017</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 103 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">bdf6e800-f613-11ed-a3d6-ad85d59eee66</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/b/bdf9cc60-41fd-11ee-b97c-f959f41b9d07.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.191.229</data>
|
| 35 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b0d69f82-1c24-11ee-8b27-872193f89e2b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.66.133</data>
|
| 43 |
+
<data key="n_hostname">100.64.66.133</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2839" target="HOST-11146">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1692826856</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">bdf9cc60-41fd-11ee-b97c-f959f41b9d07</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdf9cc70-a070-11ee-8eba-81c30328b488.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="3b7c4250-9f85-11ee-8a26-7bc049008564">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.53.157</data>
|
| 35 |
+
<data key="n_hostname">100.64.53.157</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.27.202.53</data>
|
| 43 |
+
<data key="n_hostname">172.27.202.53</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="3b7c4250-9f85-11ee-8a26-7bc049008564" target="HOST-2703">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1703211657</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">bdf9cc70-a070-11ee-8eba-81c30328b488</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/bdfa2e80-6cba-11ed-88c8-935f200141c8.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="980b4180-f3fe-11ec-bbe1-cb24dabd5745">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.72.87</data>
|
| 35 |
+
<data key="n_hostname">100.64.72.87</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="feb32f13-0d3f-11ed-9446-617dd3e298e8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.1.49</data>
|
| 43 |
+
<data key="n_hostname">100.64.1.49</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="980b4180-f3fe-11ec-bbe1-cb24dabd5745" target="HOST-12684">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1669378482</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">bdfa2e80-6cba-11ed-88c8-935f200141c8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-12684" target="980b4180-f3fe-11ec-bbe1-cb24dabd5745">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1669378482</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7</data>
|
| 67 |
+
<data key="e_suspicion_score">0.25</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Unprocessed</data>
|
| 74 |
+
<data key="e_incident_id">bdfa2e80-6cba-11ed-88c8-935f200141c8</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/b/bdfa37b0-2d5b-11ee-9400-61c78ce5335d.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2bd33551-0626-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.23.86.34</data>
|
| 35 |
+
<data key="n_hostname">172.23.86.34</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="41b00552-0627-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.19.51</data>
|
| 43 |
+
<data key="n_hostname">USER-0015-1418.example.internal</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2717" target="HOST-9706">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1690558255</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">bdfa37b0-2d5b-11ee-9400-61c78ce5335d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be02f970-cb8c-11ee-9d8c-014a3c92d0a7.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="79da4ec2-0629-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.29.4</data>
|
| 35 |
+
<data key="n_hostname">100.64.29.4</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.29.158.1</data>
|
| 43 |
+
<data key="n_hostname">172.29.158.1</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-5744" target="HOST-2858">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1707951583</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">be02f970-cb8c-11ee-9d8c-014a3c92d0a7</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be045ed0-3b73-11ef-b1e4-3da31b742190.graphml
ADDED
|
@@ -0,0 +1,293 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="fb70a701-35ed-11ef-8858-354bbb7c2f05">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.21.239</data>
|
| 35 |
+
<data key="n_hostname">100.64.21.239</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="4fc6e1e1-28f4-11ef-a77c-efa856b3599e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.54.66</data>
|
| 43 |
+
<data key="n_hostname">172.24.54.66</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="7124ee10-28fc-11ef-8a9d-45659198471d">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.46.30</data>
|
| 51 |
+
<data key="n_hostname">100.64.46.30</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="46a4a734-3b6b-11ef-ab33-5b6e38c5444d">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.46.31</data>
|
| 59 |
+
<data key="n_hostname">100.64.46.31</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="57270144-28f4-11ef-b96f-c308e7969f10">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">172.26.73.92</data>
|
| 67 |
+
<data key="n_hostname">172.26.73.92</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.841796875</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="2c9952cb-2921-11ef-b6d7-63e68fa360c9">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.20.230</data>
|
| 75 |
+
<data key="n_hostname">100.64.20.230</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="d09eeeb0-28f5-11ef-9f0c-69e5e9251182">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.23.255</data>
|
| 83 |
+
<data key="n_hostname">100.64.23.255</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="051486c2-15d6-11ee-ad6a-ddb6c172e543">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.46.32</data>
|
| 91 |
+
<data key="n_hostname">100.64.46.32</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<edge id="e1" source="HOST-4733" target="HOST-5339">
|
| 97 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 98 |
+
<data key="e_timestamp">1720255376</data>
|
| 99 |
+
<data key="e_label_binary">malicious</data>
|
| 100 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 101 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 102 |
+
<data key="e_mo_name">Data Theft</data>
|
| 103 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 104 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 105 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 106 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 107 |
+
<data key="e_disposition">Disrupted</data>
|
| 108 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 109 |
+
</edge>
|
| 110 |
+
<edge id="e2" source="HOST-5339" target="HOST-4733">
|
| 111 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 112 |
+
<data key="e_timestamp">1720255376</data>
|
| 113 |
+
<data key="e_label_binary">malicious</data>
|
| 114 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 115 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 116 |
+
<data key="e_mo_name">Data Theft</data>
|
| 117 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 118 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 119 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 120 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 121 |
+
<data key="e_disposition">Disrupted</data>
|
| 122 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 123 |
+
</edge>
|
| 124 |
+
<edge id="e3" source="HOST-5339" target="7124ee10-28fc-11ef-8a9d-45659198471d">
|
| 125 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 126 |
+
<data key="e_timestamp">1720255376</data>
|
| 127 |
+
<data key="e_label_binary">malicious</data>
|
| 128 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 129 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 130 |
+
<data key="e_mo_name">Data Theft</data>
|
| 131 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 132 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 133 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 134 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 135 |
+
<data key="e_disposition">Disrupted</data>
|
| 136 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 137 |
+
</edge>
|
| 138 |
+
<edge id="e4" source="7124ee10-28fc-11ef-8a9d-45659198471d" target="HOST-5339">
|
| 139 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 140 |
+
<data key="e_timestamp">1720255376</data>
|
| 141 |
+
<data key="e_label_binary">malicious</data>
|
| 142 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 143 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 144 |
+
<data key="e_mo_name">Data Theft</data>
|
| 145 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 146 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 147 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 148 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 149 |
+
<data key="e_disposition">Disrupted</data>
|
| 150 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 151 |
+
</edge>
|
| 152 |
+
<edge id="e5" source="46a4a734-3b6b-11ef-ab33-5b6e38c5444d" target="HOST-5339">
|
| 153 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 154 |
+
<data key="e_timestamp">1720255376</data>
|
| 155 |
+
<data key="e_label_binary">malicious</data>
|
| 156 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 157 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 158 |
+
<data key="e_mo_name">Data Theft</data>
|
| 159 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 160 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 161 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 162 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 163 |
+
<data key="e_disposition">Disrupted</data>
|
| 164 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 165 |
+
</edge>
|
| 166 |
+
<edge id="e6" source="HOST-5339" target="46a4a734-3b6b-11ef-ab33-5b6e38c5444d">
|
| 167 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 168 |
+
<data key="e_timestamp">1720255376</data>
|
| 169 |
+
<data key="e_label_binary">malicious</data>
|
| 170 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 171 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 172 |
+
<data key="e_mo_name">Data Theft</data>
|
| 173 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 174 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 175 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 176 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 177 |
+
<data key="e_disposition">Disrupted</data>
|
| 178 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 179 |
+
</edge>
|
| 180 |
+
<edge id="e7" source="46a4a734-3b6b-11ef-ab33-5b6e38c5444d" target="HOST-4725">
|
| 181 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 182 |
+
<data key="e_timestamp">1720255376</data>
|
| 183 |
+
<data key="e_label_binary">malicious</data>
|
| 184 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 185 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 186 |
+
<data key="e_mo_name">Data Theft</data>
|
| 187 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 188 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 189 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 190 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 191 |
+
<data key="e_disposition">Disrupted</data>
|
| 192 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 193 |
+
</edge>
|
| 194 |
+
<edge id="e8" source="HOST-4725" target="46a4a734-3b6b-11ef-ab33-5b6e38c5444d">
|
| 195 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 196 |
+
<data key="e_timestamp">1720255376</data>
|
| 197 |
+
<data key="e_label_binary">malicious</data>
|
| 198 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 199 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 200 |
+
<data key="e_mo_name">Data Theft</data>
|
| 201 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 202 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 203 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 204 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 205 |
+
<data key="e_disposition">Disrupted</data>
|
| 206 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 207 |
+
</edge>
|
| 208 |
+
<edge id="e9" source="HOST-4725" target="2c9952cb-2921-11ef-b6d7-63e68fa360c9">
|
| 209 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 210 |
+
<data key="e_timestamp">1720255376</data>
|
| 211 |
+
<data key="e_label_binary">malicious</data>
|
| 212 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 213 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 214 |
+
<data key="e_mo_name">Data Theft</data>
|
| 215 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 216 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 217 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 218 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 219 |
+
<data key="e_disposition">Disrupted</data>
|
| 220 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 221 |
+
</edge>
|
| 222 |
+
<edge id="e10" source="2c9952cb-2921-11ef-b6d7-63e68fa360c9" target="HOST-4725">
|
| 223 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 224 |
+
<data key="e_timestamp">1720255376</data>
|
| 225 |
+
<data key="e_label_binary">malicious</data>
|
| 226 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 227 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 228 |
+
<data key="e_mo_name">Data Theft</data>
|
| 229 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 230 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 231 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 232 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 233 |
+
<data key="e_disposition">Disrupted</data>
|
| 234 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 235 |
+
</edge>
|
| 236 |
+
<edge id="e11" source="d09eeeb0-28f5-11ef-9f0c-69e5e9251182" target="HOST-4725">
|
| 237 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 238 |
+
<data key="e_timestamp">1720255376</data>
|
| 239 |
+
<data key="e_label_binary">malicious</data>
|
| 240 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 241 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 242 |
+
<data key="e_mo_name">Data Theft</data>
|
| 243 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 244 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 245 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 246 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 247 |
+
<data key="e_disposition">Disrupted</data>
|
| 248 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 249 |
+
</edge>
|
| 250 |
+
<edge id="e12" source="HOST-4725" target="d09eeeb0-28f5-11ef-9f0c-69e5e9251182">
|
| 251 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 252 |
+
<data key="e_timestamp">1720255376</data>
|
| 253 |
+
<data key="e_label_binary">malicious</data>
|
| 254 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 255 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 256 |
+
<data key="e_mo_name">Data Theft</data>
|
| 257 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 258 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 259 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 260 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 261 |
+
<data key="e_disposition">Disrupted</data>
|
| 262 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 263 |
+
</edge>
|
| 264 |
+
<edge id="e13" source="051486c2-15d6-11ee-ad6a-ddb6c172e543" target="HOST-4725">
|
| 265 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 266 |
+
<data key="e_timestamp">1720255376</data>
|
| 267 |
+
<data key="e_label_binary">malicious</data>
|
| 268 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 269 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 270 |
+
<data key="e_mo_name">Data Theft</data>
|
| 271 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 272 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 273 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 274 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 275 |
+
<data key="e_disposition">Disrupted</data>
|
| 276 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 277 |
+
</edge>
|
| 278 |
+
<edge id="e14" source="HOST-4725" target="051486c2-15d6-11ee-ad6a-ddb6c172e543">
|
| 279 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 280 |
+
<data key="e_timestamp">1720255376</data>
|
| 281 |
+
<data key="e_label_binary">malicious</data>
|
| 282 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 283 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 284 |
+
<data key="e_mo_name">Data Theft</data>
|
| 285 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 286 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 287 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 288 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 289 |
+
<data key="e_disposition">Disrupted</data>
|
| 290 |
+
<data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
|
| 291 |
+
</edge>
|
| 292 |
+
</graph>
|
| 293 |
+
</graphml>
|
graph/incidents_graphml/b/be074240-3d0d-11ee-ba1f-812391e2855d.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.168.48</data>
|
| 35 |
+
<data key="n_hostname">172.30.168.48</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="bfe7c193-0624-11ee-8860-f951c26910c1">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.66.32</data>
|
| 43 |
+
<data key="n_hostname">100.64.66.32</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2842" target="HOST-11093">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1692283973</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be074240-3d0d-11ee-ba1f-812391e2855d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be083320-f9fb-11ee-a91e-b385ff48b568.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="0458ba10-062e-11ee-b010-f122865b5659">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.26.23.117</data>
|
| 35 |
+
<data key="n_hostname">172.26.23.117</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c06b9790-0624-11ee-9882-3f47c834d49b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.9.126</data>
|
| 43 |
+
<data key="n_hostname">100.64.9.126</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.9746875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Stealthwatch"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2824" target="HOST-3041">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1713057011</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.9746875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.9746875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be083320-f9fb-11ee-a91e-b385ff48b568</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.29.158.1</data>
|
| 35 |
+
<data key="n_hostname">172.29.158.1</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="79da4ec2-0629-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.29.4</data>
|
| 43 |
+
<data key="n_hostname">100.64.29.4</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.87625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2858" target="HOST-5744">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1707951584</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.87625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.87625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be10b0b0-4a09-11ee-8bf8-c1f4992fd587.graphml
ADDED
|
@@ -0,0 +1,359 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="583b8ce6-4808-11ee-8c3e-5dfeed3094c9">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.33.67</data>
|
| 35 |
+
<data key="n_hostname">100.64.33.67</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.31.6.172</data>
|
| 43 |
+
<data key="n_hostname">172.31.6.172</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="84fe64e0-0632-11ee-b093-7915be767a62">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.17.189</data>
|
| 51 |
+
<data key="n_hostname">100.64.17.189</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">172.29.40.149</data>
|
| 59 |
+
<data key="n_hostname">172.29.40.149</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="dea2ffc4-0997-11ee-a4e2-e3a85dae7a6d">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.33.68</data>
|
| 67 |
+
<data key="n_hostname">100.64.33.68</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="b6040490-0624-11ee-b19f-ed665a42340f">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.32.190</data>
|
| 75 |
+
<data key="n_hostname">100.64.32.190</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="70f7fb20-0969-11ee-84aa-6fd5d05369c0">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.33.69</data>
|
| 83 |
+
<data key="n_hostname">100.64.33.69</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.25</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="30cd25f0-062d-11ee-96ff-759d178f6b48">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.33.70</data>
|
| 91 |
+
<data key="n_hostname">100.64.33.70</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.25</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="89cbd2d1-062f-11ee-bac6-d555be81cc5e">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.33.71</data>
|
| 99 |
+
<data key="n_hostname">HOST-6312</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.25</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="db226370-49e0-11ee-b12e-f39f6307c380">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.33.72</data>
|
| 107 |
+
<data key="n_hostname">100.64.33.72</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.25</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="012de2d4-0795-11ee-a943-b5557ada4b44">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.17.176</data>
|
| 115 |
+
<data key="n_hostname">100.64.17.176</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.25</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<edge id="e1" source="583b8ce6-4808-11ee-8c3e-5dfeed3094c9" target="HOST-2757">
|
| 121 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 122 |
+
<data key="e_timestamp">1693711619</data>
|
| 123 |
+
<data key="e_label_binary">malicious</data>
|
| 124 |
+
<data key="e_label_confidence">0.7</data>
|
| 125 |
+
<data key="e_suspicion_score">0.25</data>
|
| 126 |
+
<data key="e_mo_name">Data Theft</data>
|
| 127 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 128 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 129 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 130 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 131 |
+
<data key="e_disposition">Unprocessed</data>
|
| 132 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 133 |
+
</edge>
|
| 134 |
+
<edge id="e2" source="HOST-2757" target="583b8ce6-4808-11ee-8c3e-5dfeed3094c9">
|
| 135 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 136 |
+
<data key="e_timestamp">1693711619</data>
|
| 137 |
+
<data key="e_label_binary">malicious</data>
|
| 138 |
+
<data key="e_label_confidence">0.7</data>
|
| 139 |
+
<data key="e_suspicion_score">0.25</data>
|
| 140 |
+
<data key="e_mo_name">Data Theft</data>
|
| 141 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 142 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 143 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 144 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 145 |
+
<data key="e_disposition">Unprocessed</data>
|
| 146 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 147 |
+
</edge>
|
| 148 |
+
<edge id="e3" source="HOST-4169" target="HOST-2834">
|
| 149 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 150 |
+
<data key="e_timestamp">1693711619</data>
|
| 151 |
+
<data key="e_label_binary">malicious</data>
|
| 152 |
+
<data key="e_label_confidence">0.7</data>
|
| 153 |
+
<data key="e_suspicion_score">0.25</data>
|
| 154 |
+
<data key="e_mo_name">Data Theft</data>
|
| 155 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 156 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 157 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 158 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 159 |
+
<data key="e_disposition">Unprocessed</data>
|
| 160 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 161 |
+
</edge>
|
| 162 |
+
<edge id="e4" source="HOST-2834" target="HOST-4169">
|
| 163 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 164 |
+
<data key="e_timestamp">1693711619</data>
|
| 165 |
+
<data key="e_label_binary">malicious</data>
|
| 166 |
+
<data key="e_label_confidence">0.7</data>
|
| 167 |
+
<data key="e_suspicion_score">0.25</data>
|
| 168 |
+
<data key="e_mo_name">Data Theft</data>
|
| 169 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 170 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 171 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 172 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 173 |
+
<data key="e_disposition">Unprocessed</data>
|
| 174 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 175 |
+
</edge>
|
| 176 |
+
<edge id="e5" source="dea2ffc4-0997-11ee-a4e2-e3a85dae7a6d" target="HOST-2834">
|
| 177 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 178 |
+
<data key="e_timestamp">1693711619</data>
|
| 179 |
+
<data key="e_label_binary">malicious</data>
|
| 180 |
+
<data key="e_label_confidence">0.7</data>
|
| 181 |
+
<data key="e_suspicion_score">0.25</data>
|
| 182 |
+
<data key="e_mo_name">Data Theft</data>
|
| 183 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 184 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 185 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 186 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 187 |
+
<data key="e_disposition">Unprocessed</data>
|
| 188 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 189 |
+
</edge>
|
| 190 |
+
<edge id="e6" source="HOST-2834" target="dea2ffc4-0997-11ee-a4e2-e3a85dae7a6d">
|
| 191 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 192 |
+
<data key="e_timestamp">1693711619</data>
|
| 193 |
+
<data key="e_label_binary">malicious</data>
|
| 194 |
+
<data key="e_label_confidence">0.7</data>
|
| 195 |
+
<data key="e_suspicion_score">0.25</data>
|
| 196 |
+
<data key="e_mo_name">Data Theft</data>
|
| 197 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 198 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 199 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 200 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 201 |
+
<data key="e_disposition">Unprocessed</data>
|
| 202 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 203 |
+
</edge>
|
| 204 |
+
<edge id="e7" source="HOST-6248" target="HOST-2834">
|
| 205 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 206 |
+
<data key="e_timestamp">1693711619</data>
|
| 207 |
+
<data key="e_label_binary">malicious</data>
|
| 208 |
+
<data key="e_label_confidence">0.7</data>
|
| 209 |
+
<data key="e_suspicion_score">0.25</data>
|
| 210 |
+
<data key="e_mo_name">Data Theft</data>
|
| 211 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 212 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 213 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 214 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 215 |
+
<data key="e_disposition">Unprocessed</data>
|
| 216 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 217 |
+
</edge>
|
| 218 |
+
<edge id="e8" source="HOST-2834" target="HOST-6248">
|
| 219 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 220 |
+
<data key="e_timestamp">1693711619</data>
|
| 221 |
+
<data key="e_label_binary">malicious</data>
|
| 222 |
+
<data key="e_label_confidence">0.7</data>
|
| 223 |
+
<data key="e_suspicion_score">0.25</data>
|
| 224 |
+
<data key="e_mo_name">Data Theft</data>
|
| 225 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 226 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 227 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 228 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 229 |
+
<data key="e_disposition">Unprocessed</data>
|
| 230 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 231 |
+
</edge>
|
| 232 |
+
<edge id="e9" source="70f7fb20-0969-11ee-84aa-6fd5d05369c0" target="HOST-2834">
|
| 233 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 234 |
+
<data key="e_timestamp">1693711619</data>
|
| 235 |
+
<data key="e_label_binary">malicious</data>
|
| 236 |
+
<data key="e_label_confidence">0.7</data>
|
| 237 |
+
<data key="e_suspicion_score">0.25</data>
|
| 238 |
+
<data key="e_mo_name">Data Theft</data>
|
| 239 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 240 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 241 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 242 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 243 |
+
<data key="e_disposition">Unprocessed</data>
|
| 244 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 245 |
+
</edge>
|
| 246 |
+
<edge id="e10" source="HOST-2834" target="70f7fb20-0969-11ee-84aa-6fd5d05369c0">
|
| 247 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 248 |
+
<data key="e_timestamp">1693711619</data>
|
| 249 |
+
<data key="e_label_binary">malicious</data>
|
| 250 |
+
<data key="e_label_confidence">0.7</data>
|
| 251 |
+
<data key="e_suspicion_score">0.25</data>
|
| 252 |
+
<data key="e_mo_name">Data Theft</data>
|
| 253 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 254 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 255 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 256 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 257 |
+
<data key="e_disposition">Unprocessed</data>
|
| 258 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 259 |
+
</edge>
|
| 260 |
+
<edge id="e11" source="30cd25f0-062d-11ee-96ff-759d178f6b48" target="HOST-2834">
|
| 261 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 262 |
+
<data key="e_timestamp">1693711619</data>
|
| 263 |
+
<data key="e_label_binary">malicious</data>
|
| 264 |
+
<data key="e_label_confidence">0.7</data>
|
| 265 |
+
<data key="e_suspicion_score">0.25</data>
|
| 266 |
+
<data key="e_mo_name">Data Theft</data>
|
| 267 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 268 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 269 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 270 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 271 |
+
<data key="e_disposition">Unprocessed</data>
|
| 272 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 273 |
+
</edge>
|
| 274 |
+
<edge id="e12" source="HOST-2834" target="30cd25f0-062d-11ee-96ff-759d178f6b48">
|
| 275 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 276 |
+
<data key="e_timestamp">1693711619</data>
|
| 277 |
+
<data key="e_label_binary">malicious</data>
|
| 278 |
+
<data key="e_label_confidence">0.7</data>
|
| 279 |
+
<data key="e_suspicion_score">0.25</data>
|
| 280 |
+
<data key="e_mo_name">Data Theft</data>
|
| 281 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 282 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 283 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 284 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 285 |
+
<data key="e_disposition">Unprocessed</data>
|
| 286 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 287 |
+
</edge>
|
| 288 |
+
<edge id="e13" source="89cbd2d1-062f-11ee-bac6-d555be81cc5e" target="HOST-2834">
|
| 289 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 290 |
+
<data key="e_timestamp">1693711619</data>
|
| 291 |
+
<data key="e_label_binary">malicious</data>
|
| 292 |
+
<data key="e_label_confidence">0.7</data>
|
| 293 |
+
<data key="e_suspicion_score">0.25</data>
|
| 294 |
+
<data key="e_mo_name">Data Theft</data>
|
| 295 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 296 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 297 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 298 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 299 |
+
<data key="e_disposition">Unprocessed</data>
|
| 300 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 301 |
+
</edge>
|
| 302 |
+
<edge id="e14" source="HOST-2834" target="89cbd2d1-062f-11ee-bac6-d555be81cc5e">
|
| 303 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 304 |
+
<data key="e_timestamp">1693711619</data>
|
| 305 |
+
<data key="e_label_binary">malicious</data>
|
| 306 |
+
<data key="e_label_confidence">0.7</data>
|
| 307 |
+
<data key="e_suspicion_score">0.25</data>
|
| 308 |
+
<data key="e_mo_name">Data Theft</data>
|
| 309 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 310 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 311 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 312 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 313 |
+
<data key="e_disposition">Unprocessed</data>
|
| 314 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 315 |
+
</edge>
|
| 316 |
+
<edge id="e15" source="db226370-49e0-11ee-b12e-f39f6307c380" target="HOST-2834">
|
| 317 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 318 |
+
<data key="e_timestamp">1693711619</data>
|
| 319 |
+
<data key="e_label_binary">malicious</data>
|
| 320 |
+
<data key="e_label_confidence">0.7</data>
|
| 321 |
+
<data key="e_suspicion_score">0.25</data>
|
| 322 |
+
<data key="e_mo_name">Data Theft</data>
|
| 323 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 324 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 325 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 326 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 327 |
+
<data key="e_disposition">Unprocessed</data>
|
| 328 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 329 |
+
</edge>
|
| 330 |
+
<edge id="e16" source="HOST-2834" target="db226370-49e0-11ee-b12e-f39f6307c380">
|
| 331 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 332 |
+
<data key="e_timestamp">1693711619</data>
|
| 333 |
+
<data key="e_label_binary">malicious</data>
|
| 334 |
+
<data key="e_label_confidence">0.7</data>
|
| 335 |
+
<data key="e_suspicion_score">0.25</data>
|
| 336 |
+
<data key="e_mo_name">Data Theft</data>
|
| 337 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 338 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 339 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 340 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 341 |
+
<data key="e_disposition">Unprocessed</data>
|
| 342 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 343 |
+
</edge>
|
| 344 |
+
<edge id="e17" source="HOST-2834" target="HOST-4156">
|
| 345 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 346 |
+
<data key="e_timestamp">1693711619</data>
|
| 347 |
+
<data key="e_label_binary">malicious</data>
|
| 348 |
+
<data key="e_label_confidence">0.7</data>
|
| 349 |
+
<data key="e_suspicion_score">0.25</data>
|
| 350 |
+
<data key="e_mo_name">Data Theft</data>
|
| 351 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 352 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 353 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 354 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 355 |
+
<data key="e_disposition">Unprocessed</data>
|
| 356 |
+
<data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
|
| 357 |
+
</edge>
|
| 358 |
+
</graph>
|
| 359 |
+
</graphml>
|
graph/incidents_graphml/b/be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.16.232.220</data>
|
| 35 |
+
<data key="n_hostname">172.16.232.220</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="457bcfd0-0626-11ee-8794-6bae0a4a6dd8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.10.46</data>
|
| 43 |
+
<data key="n_hostname">100.64.10.46</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2748" target="HOST-3134">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1707951584</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be226350-3e29-11ee-b681-89e3497f1d7e.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="0f283041-0626-11ee-b404-ff2ea490fc35">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.9.100</data>
|
| 35 |
+
<data key="n_hostname">100.64.9.100</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.54.66</data>
|
| 43 |
+
<data key="n_hostname">172.24.54.66</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-3030" target="HOST-2745">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1692405950</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">be226350-3e29-11ee-b681-89e3497f1d7e</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be256290-1c3c-11ed-9dc4-eb234c0496d2.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="73796f12-1a99-11ed-9639-939204310763">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.78.37</data>
|
| 35 |
+
<data key="n_hostname">100.64.78.37</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="dd611f50-ea91-11ec-abf7-619673fe2558">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.73.89</data>
|
| 43 |
+
<data key="n_hostname">100.64.73.89</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="73796f12-1a99-11ed-9639-939204310763" target="dd611f50-ea91-11ec-abf7-619673fe2558">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1660528273</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be256290-1c3c-11ed-9dc4-eb234c0496d2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="dd611f50-ea91-11ec-abf7-619673fe2558" target="73796f12-1a99-11ed-9639-939204310763">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1660528273</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">be256290-1c3c-11ed-9dc4-eb234c0496d2</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/b/be289e00-cf6a-11ee-91bc-e1cf8103bf6f.graphml
ADDED
|
@@ -0,0 +1,783 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="0fa593f0-07a2-11ee-aa3c-e5312f4bba5e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.19.152</data>
|
| 35 |
+
<data key="n_hostname">100.64.19.152</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.31.6.172</data>
|
| 43 |
+
<data key="n_hostname">172.31.6.172</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="ae8760b3-4cea-11ee-a3f3-dba7e831f298">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.52.104</data>
|
| 51 |
+
<data key="n_hostname">100.64.52.104</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">172.18.38.152</data>
|
| 59 |
+
<data key="n_hostname">172.18.38.152</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="4ead2ef4-0635-11ee-877a-6de6b73825b2">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.2.126</data>
|
| 67 |
+
<data key="n_hostname">100.64.2.126</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="991ba233-0641-11ee-a20a-9dfc2a4122e6">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.39.29</data>
|
| 75 |
+
<data key="n_hostname">100.64.39.29</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="27e0f133-5301-11ee-84a4-ffb01ff8a4c1">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.26.178</data>
|
| 83 |
+
<data key="n_hostname">100.64.26.178</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.25</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="b34e8181-0624-11ee-94f6-0d301f382bbb">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.3.254</data>
|
| 91 |
+
<data key="n_hostname">100.64.3.254</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.25</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="da6b9554-062e-11ee-9e70-7d7711d897d8">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">172.31.11.166</data>
|
| 99 |
+
<data key="n_hostname">172.31.11.166</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.25</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="81b7ff62-0625-11ee-87d2-5909d78e9e20">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.16.118</data>
|
| 107 |
+
<data key="n_hostname">100.64.16.118</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.25</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="b81514d6-0625-11ee-8860-f951c26910c1">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.5.188</data>
|
| 115 |
+
<data key="n_hostname">100.64.5.188</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.25</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="dbbef9e1-c719-11ee-8d6e-11118477b4e1">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">100.64.52.105</data>
|
| 123 |
+
<data key="n_hostname">100.64.52.105</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.25</data>
|
| 126 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="ba7ab840-0627-11ee-ad3e-fda0da874cab">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">100.64.9.252</data>
|
| 131 |
+
<data key="n_hostname">100.64.9.252</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.25</data>
|
| 134 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="fb871871-98ed-11ee-bd7a-6d2409f4df1b">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">100.64.8.108</data>
|
| 139 |
+
<data key="n_hostname">100.64.8.108</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.25</data>
|
| 142 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<node id="e64d3aa0-062d-11ee-a11e-275c53a8bf04">
|
| 145 |
+
<data key="n_type">HOST</data>
|
| 146 |
+
<data key="n_ip">100.64.8.120</data>
|
| 147 |
+
<data key="n_hostname">100.64.8.120</data>
|
| 148 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 149 |
+
<data key="n_suspicion_score">0.25</data>
|
| 150 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 151 |
+
</node>
|
| 152 |
+
<node id="e94aea30-502f-11ee-bf8a-7905ff4a6380">
|
| 153 |
+
<data key="n_type">HOST</data>
|
| 154 |
+
<data key="n_ip">100.64.52.106</data>
|
| 155 |
+
<data key="n_hostname">100.64.52.106</data>
|
| 156 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 157 |
+
<data key="n_suspicion_score">0.25</data>
|
| 158 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 159 |
+
</node>
|
| 160 |
+
<node id="c0a5a3a1-0b64-11ee-995c-e342b8165854">
|
| 161 |
+
<data key="n_type">HOST</data>
|
| 162 |
+
<data key="n_ip">100.64.14.22</data>
|
| 163 |
+
<data key="n_hostname">100.64.14.22</data>
|
| 164 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 165 |
+
<data key="n_suspicion_score">0.25</data>
|
| 166 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 167 |
+
</node>
|
| 168 |
+
<node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
|
| 169 |
+
<data key="n_type">HOST</data>
|
| 170 |
+
<data key="n_ip">172.16.233.43</data>
|
| 171 |
+
<data key="n_hostname">172.16.233.43</data>
|
| 172 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 173 |
+
<data key="n_suspicion_score">0.25</data>
|
| 174 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 175 |
+
</node>
|
| 176 |
+
<node id="caed0312-0643-11ee-ab31-d9cf07186757">
|
| 177 |
+
<data key="n_type">HOST</data>
|
| 178 |
+
<data key="n_ip">100.64.52.107</data>
|
| 179 |
+
<data key="n_hostname">100.64.52.107</data>
|
| 180 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 181 |
+
<data key="n_suspicion_score">0.25</data>
|
| 182 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 183 |
+
</node>
|
| 184 |
+
<node id="602621e1-0631-11ee-91b8-1b33bc4789da">
|
| 185 |
+
<data key="n_type">HOST</data>
|
| 186 |
+
<data key="n_ip">100.64.7.34</data>
|
| 187 |
+
<data key="n_hostname">100.64.7.34</data>
|
| 188 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 189 |
+
<data key="n_suspicion_score">0.25</data>
|
| 190 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 191 |
+
</node>
|
| 192 |
+
<node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
|
| 193 |
+
<data key="n_type">HOST</data>
|
| 194 |
+
<data key="n_ip">172.29.158.1</data>
|
| 195 |
+
<data key="n_hostname">172.29.158.1</data>
|
| 196 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 197 |
+
<data key="n_suspicion_score">0.25</data>
|
| 198 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 199 |
+
</node>
|
| 200 |
+
<node id="2cae6302-063a-11ee-9818-93ee35bf586a">
|
| 201 |
+
<data key="n_type">HOST</data>
|
| 202 |
+
<data key="n_ip">100.64.18.130</data>
|
| 203 |
+
<data key="n_hostname">100.64.18.130</data>
|
| 204 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 205 |
+
<data key="n_suspicion_score">0.25</data>
|
| 206 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 207 |
+
</node>
|
| 208 |
+
<edge id="e1" source="HOST-4413" target="HOST-2757">
|
| 209 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 210 |
+
<data key="e_timestamp">1708376785</data>
|
| 211 |
+
<data key="e_label_binary">malicious</data>
|
| 212 |
+
<data key="e_label_confidence">0.7</data>
|
| 213 |
+
<data key="e_suspicion_score">0.25</data>
|
| 214 |
+
<data key="e_mo_name">Data Theft</data>
|
| 215 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 216 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 217 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 218 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 219 |
+
<data key="e_disposition">Unprocessed</data>
|
| 220 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 221 |
+
</edge>
|
| 222 |
+
<edge id="e2" source="HOST-2757" target="HOST-4413">
|
| 223 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 224 |
+
<data key="e_timestamp">1708376785</data>
|
| 225 |
+
<data key="e_label_binary">malicious</data>
|
| 226 |
+
<data key="e_label_confidence">0.7</data>
|
| 227 |
+
<data key="e_suspicion_score">0.25</data>
|
| 228 |
+
<data key="e_mo_name">Data Theft</data>
|
| 229 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 230 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 231 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 232 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 233 |
+
<data key="e_disposition">Unprocessed</data>
|
| 234 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 235 |
+
</edge>
|
| 236 |
+
<edge id="e3" source="ae8760b3-4cea-11ee-a3f3-dba7e831f298" target="HOST-2844">
|
| 237 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 238 |
+
<data key="e_timestamp">1708376785</data>
|
| 239 |
+
<data key="e_label_binary">malicious</data>
|
| 240 |
+
<data key="e_label_confidence">0.7</data>
|
| 241 |
+
<data key="e_suspicion_score">0.25</data>
|
| 242 |
+
<data key="e_mo_name">Data Theft</data>
|
| 243 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 244 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 245 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 246 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 247 |
+
<data key="e_disposition">Unprocessed</data>
|
| 248 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 249 |
+
</edge>
|
| 250 |
+
<edge id="e4" source="HOST-2844" target="ae8760b3-4cea-11ee-a3f3-dba7e831f298">
|
| 251 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 252 |
+
<data key="e_timestamp">1708376785</data>
|
| 253 |
+
<data key="e_label_binary">malicious</data>
|
| 254 |
+
<data key="e_label_confidence">0.7</data>
|
| 255 |
+
<data key="e_suspicion_score">0.25</data>
|
| 256 |
+
<data key="e_mo_name">Data Theft</data>
|
| 257 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 258 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 259 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 260 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 261 |
+
<data key="e_disposition">Unprocessed</data>
|
| 262 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 263 |
+
</edge>
|
| 264 |
+
<edge id="e5" source="HOST-4413" target="HOST-2844">
|
| 265 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 266 |
+
<data key="e_timestamp">1708376785</data>
|
| 267 |
+
<data key="e_label_binary">malicious</data>
|
| 268 |
+
<data key="e_label_confidence">0.7</data>
|
| 269 |
+
<data key="e_suspicion_score">0.25</data>
|
| 270 |
+
<data key="e_mo_name">Data Theft</data>
|
| 271 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 272 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 273 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 274 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 275 |
+
<data key="e_disposition">Unprocessed</data>
|
| 276 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 277 |
+
</edge>
|
| 278 |
+
<edge id="e6" source="HOST-2844" target="HOST-4413">
|
| 279 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 280 |
+
<data key="e_timestamp">1708376785</data>
|
| 281 |
+
<data key="e_label_binary">malicious</data>
|
| 282 |
+
<data key="e_label_confidence">0.7</data>
|
| 283 |
+
<data key="e_suspicion_score">0.25</data>
|
| 284 |
+
<data key="e_mo_name">Data Theft</data>
|
| 285 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 286 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 287 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 288 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 289 |
+
<data key="e_disposition">Unprocessed</data>
|
| 290 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 291 |
+
</edge>
|
| 292 |
+
<edge id="e7" source="HOST-8249" target="HOST-2757">
|
| 293 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 294 |
+
<data key="e_timestamp">1708376785</data>
|
| 295 |
+
<data key="e_label_binary">malicious</data>
|
| 296 |
+
<data key="e_label_confidence">0.7</data>
|
| 297 |
+
<data key="e_suspicion_score">0.25</data>
|
| 298 |
+
<data key="e_mo_name">Data Theft</data>
|
| 299 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 300 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 301 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 302 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 303 |
+
<data key="e_disposition">Unprocessed</data>
|
| 304 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 305 |
+
</edge>
|
| 306 |
+
<edge id="e8" source="HOST-2757" target="HOST-8249">
|
| 307 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 308 |
+
<data key="e_timestamp">1708376785</data>
|
| 309 |
+
<data key="e_label_binary">malicious</data>
|
| 310 |
+
<data key="e_label_confidence">0.7</data>
|
| 311 |
+
<data key="e_suspicion_score">0.25</data>
|
| 312 |
+
<data key="e_mo_name">Data Theft</data>
|
| 313 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 314 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 315 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 316 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 317 |
+
<data key="e_disposition">Unprocessed</data>
|
| 318 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 319 |
+
</edge>
|
| 320 |
+
<edge id="e9" source="HOST-7081" target="HOST-2844">
|
| 321 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 322 |
+
<data key="e_timestamp">1708376785</data>
|
| 323 |
+
<data key="e_label_binary">malicious</data>
|
| 324 |
+
<data key="e_label_confidence">0.7</data>
|
| 325 |
+
<data key="e_suspicion_score">0.25</data>
|
| 326 |
+
<data key="e_mo_name">Data Theft</data>
|
| 327 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 328 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 329 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 330 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 331 |
+
<data key="e_disposition">Unprocessed</data>
|
| 332 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 333 |
+
</edge>
|
| 334 |
+
<edge id="e10" source="HOST-2844" target="HOST-7081">
|
| 335 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 336 |
+
<data key="e_timestamp">1708376785</data>
|
| 337 |
+
<data key="e_label_binary">malicious</data>
|
| 338 |
+
<data key="e_label_confidence">0.7</data>
|
| 339 |
+
<data key="e_suspicion_score">0.25</data>
|
| 340 |
+
<data key="e_mo_name">Data Theft</data>
|
| 341 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 342 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 343 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 344 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 345 |
+
<data key="e_disposition">Unprocessed</data>
|
| 346 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 347 |
+
</edge>
|
| 348 |
+
<edge id="e11" source="HOST-5404" target="HOST-2757">
|
| 349 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 350 |
+
<data key="e_timestamp">1708376785</data>
|
| 351 |
+
<data key="e_label_binary">malicious</data>
|
| 352 |
+
<data key="e_label_confidence">0.7</data>
|
| 353 |
+
<data key="e_suspicion_score">0.25</data>
|
| 354 |
+
<data key="e_mo_name">Data Theft</data>
|
| 355 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 356 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 357 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 358 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 359 |
+
<data key="e_disposition">Unprocessed</data>
|
| 360 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 361 |
+
</edge>
|
| 362 |
+
<edge id="e12" source="HOST-2757" target="HOST-5404">
|
| 363 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 364 |
+
<data key="e_timestamp">1708376785</data>
|
| 365 |
+
<data key="e_label_binary">malicious</data>
|
| 366 |
+
<data key="e_label_confidence">0.7</data>
|
| 367 |
+
<data key="e_suspicion_score">0.25</data>
|
| 368 |
+
<data key="e_mo_name">Data Theft</data>
|
| 369 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 370 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 371 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 372 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 373 |
+
<data key="e_disposition">Unprocessed</data>
|
| 374 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 375 |
+
</edge>
|
| 376 |
+
<edge id="e13" source="HOST-2948" target="HOST-2711">
|
| 377 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 378 |
+
<data key="e_timestamp">1708376785</data>
|
| 379 |
+
<data key="e_label_binary">malicious</data>
|
| 380 |
+
<data key="e_label_confidence">0.7</data>
|
| 381 |
+
<data key="e_suspicion_score">0.25</data>
|
| 382 |
+
<data key="e_mo_name">Data Theft</data>
|
| 383 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 384 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 385 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 386 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 387 |
+
<data key="e_disposition">Unprocessed</data>
|
| 388 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 389 |
+
</edge>
|
| 390 |
+
<edge id="e14" source="HOST-2711" target="HOST-2948">
|
| 391 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 392 |
+
<data key="e_timestamp">1708376785</data>
|
| 393 |
+
<data key="e_label_binary">malicious</data>
|
| 394 |
+
<data key="e_label_confidence">0.7</data>
|
| 395 |
+
<data key="e_suspicion_score">0.25</data>
|
| 396 |
+
<data key="e_mo_name">Data Theft</data>
|
| 397 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 398 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 399 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 400 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 401 |
+
<data key="e_disposition">Unprocessed</data>
|
| 402 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 403 |
+
</edge>
|
| 404 |
+
<edge id="e15" source="HOST-3993" target="HOST-2711">
|
| 405 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 406 |
+
<data key="e_timestamp">1708376785</data>
|
| 407 |
+
<data key="e_label_binary">malicious</data>
|
| 408 |
+
<data key="e_label_confidence">0.7</data>
|
| 409 |
+
<data key="e_suspicion_score">0.25</data>
|
| 410 |
+
<data key="e_mo_name">Data Theft</data>
|
| 411 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 412 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 413 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 414 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 415 |
+
<data key="e_disposition">Unprocessed</data>
|
| 416 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 417 |
+
</edge>
|
| 418 |
+
<edge id="e16" source="HOST-2711" target="HOST-3993">
|
| 419 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 420 |
+
<data key="e_timestamp">1708376785</data>
|
| 421 |
+
<data key="e_label_binary">malicious</data>
|
| 422 |
+
<data key="e_label_confidence">0.7</data>
|
| 423 |
+
<data key="e_suspicion_score">0.25</data>
|
| 424 |
+
<data key="e_mo_name">Data Theft</data>
|
| 425 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 426 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 427 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 428 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 429 |
+
<data key="e_disposition">Unprocessed</data>
|
| 430 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 431 |
+
</edge>
|
| 432 |
+
<edge id="e17" source="HOST-3525" target="HOST-2711">
|
| 433 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 434 |
+
<data key="e_timestamp">1708376785</data>
|
| 435 |
+
<data key="e_label_binary">malicious</data>
|
| 436 |
+
<data key="e_label_confidence">0.7</data>
|
| 437 |
+
<data key="e_suspicion_score">0.25</data>
|
| 438 |
+
<data key="e_mo_name">Data Theft</data>
|
| 439 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 440 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 441 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 442 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 443 |
+
<data key="e_disposition">Unprocessed</data>
|
| 444 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 445 |
+
</edge>
|
| 446 |
+
<edge id="e18" source="HOST-2711" target="HOST-3525">
|
| 447 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 448 |
+
<data key="e_timestamp">1708376785</data>
|
| 449 |
+
<data key="e_label_binary">malicious</data>
|
| 450 |
+
<data key="e_label_confidence">0.7</data>
|
| 451 |
+
<data key="e_suspicion_score">0.25</data>
|
| 452 |
+
<data key="e_mo_name">Data Theft</data>
|
| 453 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 454 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 455 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 456 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 457 |
+
<data key="e_disposition">Unprocessed</data>
|
| 458 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 459 |
+
</edge>
|
| 460 |
+
<edge id="e19" source="dbbef9e1-c719-11ee-8d6e-11118477b4e1" target="HOST-2711">
|
| 461 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 462 |
+
<data key="e_timestamp">1708376785</data>
|
| 463 |
+
<data key="e_label_binary">malicious</data>
|
| 464 |
+
<data key="e_label_confidence">0.7</data>
|
| 465 |
+
<data key="e_suspicion_score">0.25</data>
|
| 466 |
+
<data key="e_mo_name">Data Theft</data>
|
| 467 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 468 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 469 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 470 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 471 |
+
<data key="e_disposition">Unprocessed</data>
|
| 472 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 473 |
+
</edge>
|
| 474 |
+
<edge id="e20" source="HOST-2711" target="dbbef9e1-c719-11ee-8d6e-11118477b4e1">
|
| 475 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 476 |
+
<data key="e_timestamp">1708376785</data>
|
| 477 |
+
<data key="e_label_binary">malicious</data>
|
| 478 |
+
<data key="e_label_confidence">0.7</data>
|
| 479 |
+
<data key="e_suspicion_score">0.25</data>
|
| 480 |
+
<data key="e_mo_name">Data Theft</data>
|
| 481 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 482 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 483 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 484 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 485 |
+
<data key="e_disposition">Unprocessed</data>
|
| 486 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 487 |
+
</edge>
|
| 488 |
+
<edge id="e21" source="HOST-3101" target="HOST-2711">
|
| 489 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 490 |
+
<data key="e_timestamp">1708376785</data>
|
| 491 |
+
<data key="e_label_binary">malicious</data>
|
| 492 |
+
<data key="e_label_confidence">0.7</data>
|
| 493 |
+
<data key="e_suspicion_score">0.25</data>
|
| 494 |
+
<data key="e_mo_name">Data Theft</data>
|
| 495 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 496 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 497 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 498 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 499 |
+
<data key="e_disposition">Unprocessed</data>
|
| 500 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 501 |
+
</edge>
|
| 502 |
+
<edge id="e22" source="HOST-2711" target="HOST-3101">
|
| 503 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 504 |
+
<data key="e_timestamp">1708376785</data>
|
| 505 |
+
<data key="e_label_binary">malicious</data>
|
| 506 |
+
<data key="e_label_confidence">0.7</data>
|
| 507 |
+
<data key="e_suspicion_score">0.25</data>
|
| 508 |
+
<data key="e_mo_name">Data Theft</data>
|
| 509 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 510 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 511 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 512 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 513 |
+
<data key="e_disposition">Unprocessed</data>
|
| 514 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 515 |
+
</edge>
|
| 516 |
+
<edge id="e23" source="ae8760b3-4cea-11ee-a3f3-dba7e831f298" target="HOST-2711">
|
| 517 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 518 |
+
<data key="e_timestamp">1708376785</data>
|
| 519 |
+
<data key="e_label_binary">malicious</data>
|
| 520 |
+
<data key="e_label_confidence">0.7</data>
|
| 521 |
+
<data key="e_suspicion_score">0.25</data>
|
| 522 |
+
<data key="e_mo_name">Data Theft</data>
|
| 523 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 524 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 525 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 526 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 527 |
+
<data key="e_disposition">Unprocessed</data>
|
| 528 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 529 |
+
</edge>
|
| 530 |
+
<edge id="e24" source="HOST-2711" target="ae8760b3-4cea-11ee-a3f3-dba7e831f298">
|
| 531 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 532 |
+
<data key="e_timestamp">1708376785</data>
|
| 533 |
+
<data key="e_label_binary">malicious</data>
|
| 534 |
+
<data key="e_label_confidence">0.7</data>
|
| 535 |
+
<data key="e_suspicion_score">0.25</data>
|
| 536 |
+
<data key="e_mo_name">Data Theft</data>
|
| 537 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 538 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 539 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 540 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 541 |
+
<data key="e_disposition">Unprocessed</data>
|
| 542 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 543 |
+
</edge>
|
| 544 |
+
<edge id="e25" source="HOST-2890" target="HOST-2757">
|
| 545 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 546 |
+
<data key="e_timestamp">1708376785</data>
|
| 547 |
+
<data key="e_label_binary">malicious</data>
|
| 548 |
+
<data key="e_label_confidence">0.7</data>
|
| 549 |
+
<data key="e_suspicion_score">0.25</data>
|
| 550 |
+
<data key="e_mo_name">Data Theft</data>
|
| 551 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 552 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 553 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 554 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 555 |
+
<data key="e_disposition">Unprocessed</data>
|
| 556 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 557 |
+
</edge>
|
| 558 |
+
<edge id="e26" source="HOST-2757" target="HOST-2890">
|
| 559 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 560 |
+
<data key="e_timestamp">1708376785</data>
|
| 561 |
+
<data key="e_label_binary">malicious</data>
|
| 562 |
+
<data key="e_label_confidence">0.7</data>
|
| 563 |
+
<data key="e_suspicion_score">0.25</data>
|
| 564 |
+
<data key="e_mo_name">Data Theft</data>
|
| 565 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 566 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 567 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 568 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 569 |
+
<data key="e_disposition">Unprocessed</data>
|
| 570 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 571 |
+
</edge>
|
| 572 |
+
<edge id="e27" source="HOST-2902" target="HOST-2711">
|
| 573 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 574 |
+
<data key="e_timestamp">1708376785</data>
|
| 575 |
+
<data key="e_label_binary">malicious</data>
|
| 576 |
+
<data key="e_label_confidence">0.7</data>
|
| 577 |
+
<data key="e_suspicion_score">0.25</data>
|
| 578 |
+
<data key="e_mo_name">Data Theft</data>
|
| 579 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 580 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 581 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 582 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 583 |
+
<data key="e_disposition">Unprocessed</data>
|
| 584 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 585 |
+
</edge>
|
| 586 |
+
<edge id="e28" source="HOST-2711" target="HOST-2902">
|
| 587 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 588 |
+
<data key="e_timestamp">1708376785</data>
|
| 589 |
+
<data key="e_label_binary">malicious</data>
|
| 590 |
+
<data key="e_label_confidence">0.7</data>
|
| 591 |
+
<data key="e_suspicion_score">0.25</data>
|
| 592 |
+
<data key="e_mo_name">Data Theft</data>
|
| 593 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 594 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 595 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 596 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 597 |
+
<data key="e_disposition">Unprocessed</data>
|
| 598 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 599 |
+
</edge>
|
| 600 |
+
<edge id="e29" source="e94aea30-502f-11ee-bf8a-7905ff4a6380" target="HOST-2711">
|
| 601 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 602 |
+
<data key="e_timestamp">1708376785</data>
|
| 603 |
+
<data key="e_label_binary">malicious</data>
|
| 604 |
+
<data key="e_label_confidence">0.7</data>
|
| 605 |
+
<data key="e_suspicion_score">0.25</data>
|
| 606 |
+
<data key="e_mo_name">Data Theft</data>
|
| 607 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 608 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 609 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 610 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 611 |
+
<data key="e_disposition">Unprocessed</data>
|
| 612 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 613 |
+
</edge>
|
| 614 |
+
<edge id="e30" source="HOST-2711" target="e94aea30-502f-11ee-bf8a-7905ff4a6380">
|
| 615 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 616 |
+
<data key="e_timestamp">1708376785</data>
|
| 617 |
+
<data key="e_label_binary">malicious</data>
|
| 618 |
+
<data key="e_label_confidence">0.7</data>
|
| 619 |
+
<data key="e_suspicion_score">0.25</data>
|
| 620 |
+
<data key="e_mo_name">Data Theft</data>
|
| 621 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 622 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 623 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 624 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 625 |
+
<data key="e_disposition">Unprocessed</data>
|
| 626 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 627 |
+
</edge>
|
| 628 |
+
<edge id="e31" source="HOST-3648" target="HOST-2758">
|
| 629 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 630 |
+
<data key="e_timestamp">1708376785</data>
|
| 631 |
+
<data key="e_label_binary">malicious</data>
|
| 632 |
+
<data key="e_label_confidence">0.7</data>
|
| 633 |
+
<data key="e_suspicion_score">0.25</data>
|
| 634 |
+
<data key="e_mo_name">Data Theft</data>
|
| 635 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 636 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 637 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 638 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 639 |
+
<data key="e_disposition">Unprocessed</data>
|
| 640 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 641 |
+
</edge>
|
| 642 |
+
<edge id="e32" source="HOST-2758" target="HOST-3648">
|
| 643 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 644 |
+
<data key="e_timestamp">1708376785</data>
|
| 645 |
+
<data key="e_label_binary">malicious</data>
|
| 646 |
+
<data key="e_label_confidence">0.7</data>
|
| 647 |
+
<data key="e_suspicion_score">0.25</data>
|
| 648 |
+
<data key="e_mo_name">Data Theft</data>
|
| 649 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 650 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 651 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 652 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 653 |
+
<data key="e_disposition">Unprocessed</data>
|
| 654 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 655 |
+
</edge>
|
| 656 |
+
<edge id="e33" source="caed0312-0643-11ee-ab31-d9cf07186757" target="HOST-2758">
|
| 657 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 658 |
+
<data key="e_timestamp">1708376785</data>
|
| 659 |
+
<data key="e_label_binary">malicious</data>
|
| 660 |
+
<data key="e_label_confidence">0.7</data>
|
| 661 |
+
<data key="e_suspicion_score">0.25</data>
|
| 662 |
+
<data key="e_mo_name">Data Theft</data>
|
| 663 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 664 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 665 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 666 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 667 |
+
<data key="e_disposition">Unprocessed</data>
|
| 668 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 669 |
+
</edge>
|
| 670 |
+
<edge id="e34" source="HOST-2758" target="caed0312-0643-11ee-ab31-d9cf07186757">
|
| 671 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 672 |
+
<data key="e_timestamp">1708376785</data>
|
| 673 |
+
<data key="e_label_binary">malicious</data>
|
| 674 |
+
<data key="e_label_confidence">0.7</data>
|
| 675 |
+
<data key="e_suspicion_score">0.25</data>
|
| 676 |
+
<data key="e_mo_name">Data Theft</data>
|
| 677 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 678 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 679 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 680 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 681 |
+
<data key="e_disposition">Unprocessed</data>
|
| 682 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 683 |
+
</edge>
|
| 684 |
+
<edge id="e35" source="HOST-5404" target="HOST-2758">
|
| 685 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 686 |
+
<data key="e_timestamp">1708376785</data>
|
| 687 |
+
<data key="e_label_binary">malicious</data>
|
| 688 |
+
<data key="e_label_confidence">0.7</data>
|
| 689 |
+
<data key="e_suspicion_score">0.25</data>
|
| 690 |
+
<data key="e_mo_name">Data Theft</data>
|
| 691 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 692 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 693 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 694 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 695 |
+
<data key="e_disposition">Unprocessed</data>
|
| 696 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 697 |
+
</edge>
|
| 698 |
+
<edge id="e36" source="HOST-2758" target="HOST-5404">
|
| 699 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 700 |
+
<data key="e_timestamp">1708376785</data>
|
| 701 |
+
<data key="e_label_binary">malicious</data>
|
| 702 |
+
<data key="e_label_confidence">0.7</data>
|
| 703 |
+
<data key="e_suspicion_score">0.25</data>
|
| 704 |
+
<data key="e_mo_name">Data Theft</data>
|
| 705 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 706 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 707 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 708 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 709 |
+
<data key="e_disposition">Unprocessed</data>
|
| 710 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 711 |
+
</edge>
|
| 712 |
+
<edge id="e37" source="HOST-7847" target="HOST-2844">
|
| 713 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 714 |
+
<data key="e_timestamp">1708376785</data>
|
| 715 |
+
<data key="e_label_binary">malicious</data>
|
| 716 |
+
<data key="e_label_confidence">0.7</data>
|
| 717 |
+
<data key="e_suspicion_score">0.25</data>
|
| 718 |
+
<data key="e_mo_name">Data Theft</data>
|
| 719 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 720 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 721 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 722 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 723 |
+
<data key="e_disposition">Unprocessed</data>
|
| 724 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 725 |
+
</edge>
|
| 726 |
+
<edge id="e38" source="HOST-2844" target="HOST-7847">
|
| 727 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 728 |
+
<data key="e_timestamp">1708376785</data>
|
| 729 |
+
<data key="e_label_binary">malicious</data>
|
| 730 |
+
<data key="e_label_confidence">0.7</data>
|
| 731 |
+
<data key="e_suspicion_score">0.25</data>
|
| 732 |
+
<data key="e_mo_name">Data Theft</data>
|
| 733 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 734 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 735 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 736 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 737 |
+
<data key="e_disposition">Unprocessed</data>
|
| 738 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 739 |
+
</edge>
|
| 740 |
+
<edge id="e39" source="HOST-7081" target="HOST-2858">
|
| 741 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 742 |
+
<data key="e_timestamp">1708376785</data>
|
| 743 |
+
<data key="e_label_binary">malicious</data>
|
| 744 |
+
<data key="e_label_confidence">0.7</data>
|
| 745 |
+
<data key="e_suspicion_score">0.25</data>
|
| 746 |
+
<data key="e_mo_name">Data Theft</data>
|
| 747 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 748 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 749 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 750 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 751 |
+
<data key="e_disposition">Unprocessed</data>
|
| 752 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 753 |
+
</edge>
|
| 754 |
+
<edge id="e40" source="HOST-4477" target="HOST-2844">
|
| 755 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 756 |
+
<data key="e_timestamp">1708376785</data>
|
| 757 |
+
<data key="e_label_binary">malicious</data>
|
| 758 |
+
<data key="e_label_confidence">0.7</data>
|
| 759 |
+
<data key="e_suspicion_score">0.25</data>
|
| 760 |
+
<data key="e_mo_name">Data Theft</data>
|
| 761 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 762 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 763 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 764 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 765 |
+
<data key="e_disposition">Unprocessed</data>
|
| 766 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 767 |
+
</edge>
|
| 768 |
+
<edge id="e41" source="HOST-2844" target="HOST-4477">
|
| 769 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 770 |
+
<data key="e_timestamp">1708376785</data>
|
| 771 |
+
<data key="e_label_binary">malicious</data>
|
| 772 |
+
<data key="e_label_confidence">0.7</data>
|
| 773 |
+
<data key="e_suspicion_score">0.25</data>
|
| 774 |
+
<data key="e_mo_name">Data Theft</data>
|
| 775 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 776 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 777 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 778 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 779 |
+
<data key="e_disposition">Unprocessed</data>
|
| 780 |
+
<data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
|
| 781 |
+
</edge>
|
| 782 |
+
</graph>
|
| 783 |
+
</graphml>
|
graph/incidents_graphml/b/be28cd70-f613-11ed-a3d6-ad85d59eee66.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="4b7c99c0-9d8d-11ed-98f8-cd6642d241c0">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.72.69</data>
|
| 35 |
+
<data key="n_hostname">100.64.72.69</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="59785ec4-9d87-11ed-98f8-cd6642d241c0">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.27.73</data>
|
| 43 |
+
<data key="n_hostname">100.64.27.73</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="0d3ecaa2-9d8a-11ed-9ba1-69c845a45d44">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.3.153</data>
|
| 51 |
+
<data key="n_hostname">100.64.3.153</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="4b7c99c0-9d8d-11ed-98f8-cd6642d241c0" target="59785ec4-9d87-11ed-98f8-cd6642d241c0">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1684480017</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 61 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Disrupted</data>
|
| 68 |
+
<data key="e_incident_id">be28cd70-f613-11ed-a3d6-ad85d59eee66</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="59785ec4-9d87-11ed-98f8-cd6642d241c0" target="4b7c99c0-9d8d-11ed-98f8-cd6642d241c0">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1684480017</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 75 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">be28cd70-f613-11ed-a3d6-ad85d59eee66</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="4b7c99c0-9d8d-11ed-98f8-cd6642d241c0" target="0d3ecaa2-9d8a-11ed-9ba1-69c845a45d44">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1684480017</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 89 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">be28cd70-f613-11ed-a3d6-ad85d59eee66</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="0d3ecaa2-9d8a-11ed-9ba1-69c845a45d44" target="4b7c99c0-9d8d-11ed-98f8-cd6642d241c0">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1684480017</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 103 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">be28cd70-f613-11ed-a3d6-ad85d59eee66</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/b/be29bb50-cb8c-11ee-9d8c-014a3c92d0a7.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b65f9033-aab6-11ee-b6ae-af8e9e75d7cf">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.59.22</data>
|
| 35 |
+
<data key="n_hostname">100.64.59.22</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.29.1.127</data>
|
| 43 |
+
<data key="n_hostname">172.29.1.127</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="b65f9033-aab6-11ee-b6ae-af8e9e75d7cf" target="HOST-2713">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1707951584</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">be29bb50-cb8c-11ee-9d8c-014a3c92d0a7</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be2edc40-2d5b-11ee-9400-61c78ce5335d.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.22.127.96</data>
|
| 35 |
+
<data key="n_hostname">172.22.127.96</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="37eac321-07a3-11ee-8369-f7804467b915">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.43.122</data>
|
| 43 |
+
<data key="n_hostname">100.64.43.122</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2726" target="HOST-7722">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1690558255</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">be2edc40-2d5b-11ee-9400-61c78ce5335d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be33c870-3e29-11ee-b681-89e3497f1d7e.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.54.66</data>
|
| 35 |
+
<data key="n_hostname">172.24.54.66</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="0f283041-0626-11ee-b404-ff2ea490fc35">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.9.100</data>
|
| 43 |
+
<data key="n_hostname">100.64.9.100</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2745" target="HOST-3030">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1692405950</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">be33c870-3e29-11ee-b681-89e3497f1d7e</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be35f050-cb8c-11ee-9d8c-014a3c92d0a7.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.29.1.127</data>
|
| 35 |
+
<data key="n_hostname">172.29.1.127</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b65f9033-aab6-11ee-b6ae-af8e9e75d7cf">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.59.22</data>
|
| 43 |
+
<data key="n_hostname">100.64.59.22</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2713" target="HOST-10035">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1707951584</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be35f050-cb8c-11ee-9d8c-014a3c92d0a7</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be3a7230-a060-11ee-9181-41cbe26a7b16.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="bceb9f2b-a020-11ee-9577-6b437ad5f87f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.68.41</data>
|
| 35 |
+
<data key="n_hostname">100.64.68.41</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.746875</data>
|
| 38 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c9c2af8d-0625-11ee-9f36-61ae8743c399">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.68.23</data>
|
| 43 |
+
<data key="n_hostname">100.64.68.23</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.6625</data>
|
| 46 |
+
<data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="bceb9f2b-a020-11ee-9577-6b437ad5f87f" target="HOST-11393">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1703204786</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.746875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be3a7230-a060-11ee-9181-41cbe26a7b16</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-11393" target="bceb9f2b-a020-11ee-9577-6b437ad5f87f">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1703204786</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.746875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">be3a7230-a060-11ee-9181-41cbe26a7b16</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/b/be3d1510-2f74-11ee-8001-3b5fed8c9dd3.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="0fb15250-2cc6-11ee-b811-1bf83c6c4911">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.57.188</data>
|
| 35 |
+
<data key="n_hostname">100.64.57.188</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.229.11</data>
|
| 43 |
+
<data key="n_hostname">172.30.229.11</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="0fb15250-2cc6-11ee-b811-1bf83c6c4911" target="HOST-2750">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1690788895</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">be3d1510-2f74-11ee-8001-3b5fed8c9dd3</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be3e4440-117d-11ee-b107-2764325d5a51.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="6a944122-1090-11ee-a0fd-2b70b5043c8d">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.60.154</data>
|
| 35 |
+
<data key="n_hostname">100.64.60.154</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.208.219</data>
|
| 43 |
+
<data key="n_hostname">172.30.208.219</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="6a944122-1090-11ee-a0fd-2b70b5043c8d" target="HOST-2823">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1687494225</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be3e4440-117d-11ee-b107-2764325d5a51</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-2823" target="6a944122-1090-11ee-a0fd-2b70b5043c8d">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1687494225</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">be3e4440-117d-11ee-b107-2764325d5a51</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/b/be43c370-edf0-11ee-aef3-7fbaf9d61c41.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="97636251-062a-11ee-8860-f951c26910c1">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.201.119</data>
|
| 35 |
+
<data key="n_hostname">172.30.201.119</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="62300739-0627-11ee-94f6-0d301f382bbb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.45.157</data>
|
| 43 |
+
<data key="n_hostname">100.64.45.157</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2760" target="62300739-0627-11ee-94f6-0d301f382bbb">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1711732873</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be43c370-edf0-11ee-aef3-7fbaf9d61c41</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be4906a0-ffe3-11ee-b8be-512e5047d566.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="766f2a90-2847-11ee-ae8d-b56e8c062a11">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.33.175</data>
|
| 35 |
+
<data key="n_hostname">100.64.33.175</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.214.148</data>
|
| 43 |
+
<data key="n_hostname">172.30.214.148</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-6366" target="HOST-2720">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1713706411</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be4906a0-ffe3-11ee-b8be-512e5047d566</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be4d2280-ebef-11ec-9679-75d3d6184114.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="13dcb940-ea92-11ec-abf7-619673fe2558">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.71.80</data>
|
| 35 |
+
<data key="n_hostname">100.64.71.80</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e9623e10-ea91-11ec-abf7-619673fe2558">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.76.116</data>
|
| 43 |
+
<data key="n_hostname">USER-0015-1741.example.internal</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-12642" target="HOST-14218">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1655217546</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be4d2280-ebef-11ec-9679-75d3d6184114</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-14218" target="HOST-12642">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1655217546</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 67 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">be4d2280-ebef-11ec-9679-75d3d6184114</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/b/be583f00-0d16-11ee-9392-932bfd273540.graphml
ADDED
|
@@ -0,0 +1,135 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b97accd1-06c9-11ee-9422-7fd0446b91aa">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.21.65</data>
|
| 35 |
+
<data key="n_hostname">100.64.21.65</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.68359375</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="1a2ad020-0639-11ee-afe7-f371512a14a3">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.72.42</data>
|
| 43 |
+
<data key="n_hostname">100.64.72.42</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="3a88fa81-062b-11ee-8ffb-516c3122460e">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.73.39</data>
|
| 51 |
+
<data key="n_hostname">100.64.73.39</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="b8ff3f01-062b-11ee-8b63-19546bc2fdf3">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.70.250</data>
|
| 59 |
+
<data key="n_hostname">100.64.70.250</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 62 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<edge id="e1" source="HOST-13439" target="HOST-14713">
|
| 65 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 66 |
+
<data key="e_timestamp">1687010183</data>
|
| 67 |
+
<data key="e_label_binary">malicious</data>
|
| 68 |
+
<data key="e_label_confidence">0.71875</data>
|
| 69 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 70 |
+
<data key="e_mo_name">Data Theft</data>
|
| 71 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 72 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 73 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 74 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 75 |
+
<data key="e_disposition">Disrupted</data>
|
| 76 |
+
<data key="e_incident_id">be583f00-0d16-11ee-9392-932bfd273540</data>
|
| 77 |
+
</edge>
|
| 78 |
+
<edge id="e2" source="HOST-14713" target="HOST-13439">
|
| 79 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 80 |
+
<data key="e_timestamp">1687010183</data>
|
| 81 |
+
<data key="e_label_binary">malicious</data>
|
| 82 |
+
<data key="e_label_confidence">0.71875</data>
|
| 83 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 84 |
+
<data key="e_mo_name">Data Theft</data>
|
| 85 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 86 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 87 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 88 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 89 |
+
<data key="e_disposition">Disrupted</data>
|
| 90 |
+
<data key="e_incident_id">be583f00-0d16-11ee-9392-932bfd273540</data>
|
| 91 |
+
</edge>
|
| 92 |
+
<edge id="e3" source="HOST-13439" target="HOST-14322">
|
| 93 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 94 |
+
<data key="e_timestamp">1687010183</data>
|
| 95 |
+
<data key="e_label_binary">malicious</data>
|
| 96 |
+
<data key="e_label_confidence">0.71875</data>
|
| 97 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 98 |
+
<data key="e_mo_name">Data Theft</data>
|
| 99 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 100 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 101 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 102 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 103 |
+
<data key="e_disposition">Disrupted</data>
|
| 104 |
+
<data key="e_incident_id">be583f00-0d16-11ee-9392-932bfd273540</data>
|
| 105 |
+
</edge>
|
| 106 |
+
<edge id="e4" source="HOST-14322" target="HOST-13439">
|
| 107 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 108 |
+
<data key="e_timestamp">1687010183</data>
|
| 109 |
+
<data key="e_label_binary">malicious</data>
|
| 110 |
+
<data key="e_label_confidence">0.71875</data>
|
| 111 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 112 |
+
<data key="e_mo_name">Data Theft</data>
|
| 113 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 114 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 115 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 116 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 117 |
+
<data key="e_disposition">Disrupted</data>
|
| 118 |
+
<data key="e_incident_id">be583f00-0d16-11ee-9392-932bfd273540</data>
|
| 119 |
+
</edge>
|
| 120 |
+
<edge id="e5" source="HOST-13439" target="HOST-13864">
|
| 121 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 122 |
+
<data key="e_timestamp">1687010183</data>
|
| 123 |
+
<data key="e_label_binary">malicious</data>
|
| 124 |
+
<data key="e_label_confidence">0.71875</data>
|
| 125 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 126 |
+
<data key="e_mo_name">Data Theft</data>
|
| 127 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 128 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 129 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 130 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 131 |
+
<data key="e_disposition">Disrupted</data>
|
| 132 |
+
<data key="e_incident_id">be583f00-0d16-11ee-9392-932bfd273540</data>
|
| 133 |
+
</edge>
|
| 134 |
+
</graph>
|
| 135 |
+
</graphml>
|
graph/incidents_graphml/b/be5a98c0-f6a1-11ee-8b23-bde5dce38992.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="8bbe9ac2-8a08-11ee-a737-d35d6de933b4">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.22.18</data>
|
| 35 |
+
<data key="n_hostname">100.64.22.18</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.208.219</data>
|
| 43 |
+
<data key="n_hostname">172.30.208.219</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="8bbe9ac2-8a08-11ee-a737-d35d6de933b4" target="HOST-2823">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1712688503</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">be5a98c0-f6a1-11ee-8b23-bde5dce38992</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be5f2330-cb8c-11ee-9d8c-014a3c92d0a7.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="a6690492-abd8-11ee-ad83-c50df8dbbb95">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.59.24</data>
|
| 35 |
+
<data key="n_hostname">100.64.59.24</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="260096f3-062a-11ee-94f6-0d301f382bbb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.174.172</data>
|
| 43 |
+
<data key="n_hostname">172.30.174.172</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="a6690492-abd8-11ee-ad83-c50df8dbbb95" target="HOST-2946">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1707951584</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be5f2330-cb8c-11ee-9d8c-014a3c92d0a7</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be62e490-2d5b-11ee-9400-61c78ce5335d.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.31.182.227</data>
|
| 35 |
+
<data key="n_hostname">172.31.182.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="8d01ae63-0e0f-11ee-a496-e3cc7c0f6d11">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.18.251</data>
|
| 43 |
+
<data key="n_hostname">100.64.18.251</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2761" target="HOST-4327">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1690558255</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be62e490-2d5b-11ee-9400-61c78ce5335d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be662630-21fe-11ef-a065-0d11f2930c39.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="bdea6680-21fe-11ef-aaa9-5917491e690f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.32.153</data>
|
| 35 |
+
<data key="n_hostname">100.64.32.153</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.25.222.10</data>
|
| 43 |
+
<data key="n_hostname">172.25.222.10</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="bdea6680-21fe-11ef-aaa9-5917491e690f" target="HOST-2768">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1717456347</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be662630-21fe-11ef-a065-0d11f2930c39</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be6b96c0-edf0-11ee-aef3-7fbaf9d61c41.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="179bcaa1-ed95-11ee-9ea1-0d6693bae781">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.45.159</data>
|
| 35 |
+
<data key="n_hostname">100.64.45.159</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="260096f4-062a-11ee-94f6-0d301f382bbb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.135.251.191</data>
|
| 43 |
+
<data key="n_hostname">10.135.251.191</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="179bcaa1-ed95-11ee-9ea1-0d6693bae781" target="HOST-2751">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1711732873</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be6b96c0-edf0-11ee-aef3-7fbaf9d61c41</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="260096f3-062a-11ee-94f6-0d301f382bbb">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.174.172</data>
|
| 35 |
+
<data key="n_hostname">172.30.174.172</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a6690492-abd8-11ee-ad83-c50df8dbbb95">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.59.24</data>
|
| 43 |
+
<data key="n_hostname">100.64.59.24</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2946" target="HOST-10036">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1707951584</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/b/be6e3f00-6c00-11ee-9973-9b86183b2cfc.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="8c867744-126a-11ee-98ae-c11e532db376">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.45.157</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-2038.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="638b5b01-95e5-11ed-b28e-ad8d3bab1fa5">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.221.82.8</data>
|
| 43 |
+
<data key="n_hostname">10.221.82.8</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="8c867744-126a-11ee-98ae-c11e532db376" target="HOST-17427">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697446094</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">be6e3f00-6c00-11ee-9973-9b86183b2cfc</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|