f15hb0wn commited on
Commit
dcac60c
·
verified ·
1 Parent(s): ecfd21d

Upload per-incident GraphML sharded batch 20/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/b/bdab66a0-3d0d-11ee-ba1f-812391e2855d.graphml +63 -0
  2. graph/incidents_graphml/b/bdb21760-311a-11ee-87a2-613e036775fd.graphml +387 -0
  3. graph/incidents_graphml/b/bdb25870-5bee-11ee-82a0-9da780b0dcc4.graphml +63 -0
  4. graph/incidents_graphml/b/bdb2b730-6c00-11ee-9973-9b86183b2cfc.graphml +63 -0
  5. graph/incidents_graphml/b/bdb6d7c0-131d-11ee-8854-7b8acd154f2f.graphml +63 -0
  6. graph/incidents_graphml/b/bdb75c00-a166-11ed-863f-a161c6cf34a1.graphml +113 -0
  7. graph/incidents_graphml/b/bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f.graphml +825 -0
  8. graph/incidents_graphml/b/bdbd55c0-2d5b-11ee-9400-61c78ce5335d.graphml +63 -0
  9. graph/incidents_graphml/b/bdbdb370-ba66-11ed-ace2-c7d81fb15087.graphml +63 -0
  10. graph/incidents_graphml/b/bdc10f10-6c00-11ee-9973-9b86183b2cfc.graphml +107 -0
  11. graph/incidents_graphml/b/bdc19ab0-5bee-11ee-82a0-9da780b0dcc4.graphml +63 -0
  12. graph/incidents_graphml/b/bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
  13. graph/incidents_graphml/b/bdccd150-3d0d-11ee-ba1f-812391e2855d.graphml +63 -0
  14. graph/incidents_graphml/b/bdd07860-6c00-11ee-9973-9b86183b2cfc.graphml +63 -0
  15. graph/incidents_graphml/b/bdea14f0-41fd-11ee-b97c-f959f41b9d07.graphml +63 -0
  16. graph/incidents_graphml/b/bdeefa80-00b9-11ef-8b56-b9c5ad676a8a.graphml +149 -0
  17. graph/incidents_graphml/b/bdf6e800-f613-11ed-a3d6-ad85d59eee66.graphml +113 -0
  18. graph/incidents_graphml/b/bdf9cc60-41fd-11ee-b97c-f959f41b9d07.graphml +63 -0
  19. graph/incidents_graphml/b/bdf9cc70-a070-11ee-8eba-81c30328b488.graphml +63 -0
  20. graph/incidents_graphml/b/bdfa2e80-6cba-11ed-88c8-935f200141c8.graphml +77 -0
  21. graph/incidents_graphml/b/bdfa37b0-2d5b-11ee-9400-61c78ce5335d.graphml +63 -0
  22. graph/incidents_graphml/b/be02f970-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
  23. graph/incidents_graphml/b/be045ed0-3b73-11ef-b1e4-3da31b742190.graphml +293 -0
  24. graph/incidents_graphml/b/be074240-3d0d-11ee-ba1f-812391e2855d.graphml +63 -0
  25. graph/incidents_graphml/b/be083320-f9fb-11ee-a91e-b385ff48b568.graphml +63 -0
  26. graph/incidents_graphml/b/be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
  27. graph/incidents_graphml/b/be10b0b0-4a09-11ee-8bf8-c1f4992fd587.graphml +359 -0
  28. graph/incidents_graphml/b/be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
  29. graph/incidents_graphml/b/be226350-3e29-11ee-b681-89e3497f1d7e.graphml +63 -0
  30. graph/incidents_graphml/b/be256290-1c3c-11ed-9dc4-eb234c0496d2.graphml +77 -0
  31. graph/incidents_graphml/b/be289e00-cf6a-11ee-91bc-e1cf8103bf6f.graphml +783 -0
  32. graph/incidents_graphml/b/be28cd70-f613-11ed-a3d6-ad85d59eee66.graphml +113 -0
  33. graph/incidents_graphml/b/be29bb50-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
  34. graph/incidents_graphml/b/be2edc40-2d5b-11ee-9400-61c78ce5335d.graphml +63 -0
  35. graph/incidents_graphml/b/be33c870-3e29-11ee-b681-89e3497f1d7e.graphml +63 -0
  36. graph/incidents_graphml/b/be35f050-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
  37. graph/incidents_graphml/b/be3a7230-a060-11ee-9181-41cbe26a7b16.graphml +77 -0
  38. graph/incidents_graphml/b/be3d1510-2f74-11ee-8001-3b5fed8c9dd3.graphml +63 -0
  39. graph/incidents_graphml/b/be3e4440-117d-11ee-b107-2764325d5a51.graphml +77 -0
  40. graph/incidents_graphml/b/be43c370-edf0-11ee-aef3-7fbaf9d61c41.graphml +63 -0
  41. graph/incidents_graphml/b/be4906a0-ffe3-11ee-b8be-512e5047d566.graphml +63 -0
  42. graph/incidents_graphml/b/be4d2280-ebef-11ec-9679-75d3d6184114.graphml +77 -0
  43. graph/incidents_graphml/b/be583f00-0d16-11ee-9392-932bfd273540.graphml +135 -0
  44. graph/incidents_graphml/b/be5a98c0-f6a1-11ee-8b23-bde5dce38992.graphml +63 -0
  45. graph/incidents_graphml/b/be5f2330-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
  46. graph/incidents_graphml/b/be62e490-2d5b-11ee-9400-61c78ce5335d.graphml +63 -0
  47. graph/incidents_graphml/b/be662630-21fe-11ef-a065-0d11f2930c39.graphml +63 -0
  48. graph/incidents_graphml/b/be6b96c0-edf0-11ee-aef3-7fbaf9d61c41.graphml +63 -0
  49. graph/incidents_graphml/b/be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7.graphml +63 -0
  50. graph/incidents_graphml/b/be6e3f00-6c00-11ee-9973-9b86183b2cfc.graphml +63 -0
graph/incidents_graphml/b/bdab66a0-3d0d-11ee-ba1f-812391e2855d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.182.227</data>
35
+ <data key="n_hostname">172.31.182.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="49d6a2a3-25dc-11ee-a096-c7bd5c661fc8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.66.30</data>
43
+ <data key="n_hostname">100.64.66.30</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2761" target="49d6a2a3-25dc-11ee-a096-c7bd5c661fc8">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692283972</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">bdab66a0-3d0d-11ee-ba1f-812391e2855d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdb21760-311a-11ee-87a2-613e036775fd.graphml ADDED
@@ -0,0 +1,387 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bc01cf50-311a-11ee-ac64-bb65677f617e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.58.64</data>
35
+ <data key="n_hostname">100.64.58.64</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.200.243</data>
43
+ <data key="n_hostname">172.30.200.243</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.9208984375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="77e4e920-0e05-11ee-83c2-430175bac8b6">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.58.65</data>
51
+ <data key="n_hostname">100.64.58.65</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="3971ef62-259f-11ee-a116-af2c3a0e2f1a">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.58.66</data>
59
+ <data key="n_hostname">100.64.58.66</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.4375</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="69420c40-2705-11ee-96f7-ef9658dca3bb">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.58.67</data>
67
+ <data key="n_hostname">100.64.58.67</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="f2420741-12b8-11ee-9c7e-07083ed7c247">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.58.68</data>
75
+ <data key="n_hostname">USER-0015-1427.example.internal</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.578125</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="ff15d616-3106-11ee-ad50-4366968404b1">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.58.69</data>
83
+ <data key="n_hostname">100.64.58.69</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.578125</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="31021680-2517-11ee-bbc8-db39ada6e4de">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.58.70</data>
91
+ <data key="n_hostname">100.64.58.70</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.4375</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">172.23.86.34</data>
99
+ <data key="n_hostname">172.23.86.34</data>
100
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="ab0431c3-0d8e-11ee-96aa-451df7608a05">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.11.207</data>
107
+ <data key="n_hostname">100.64.11.207</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.71875</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="051448f2-310f-11ee-9ac0-efae50d8c2ef">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.58.71</data>
115
+ <data key="n_hostname">100.64.58.71</data>
116
+ <data key="n_set_roles">["Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.578125</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <edge id="e1" source="bc01cf50-311a-11ee-ac64-bb65677f617e" target="HOST-2706">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1690970141</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.9208984375</data>
125
+ <data key="e_suspicion_score">0.9208984375</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
133
+ </edge>
134
+ <edge id="e2" source="HOST-2706" target="bc01cf50-311a-11ee-ac64-bb65677f617e">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1690970141</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.9208984375</data>
139
+ <data key="e_suspicion_score">0.9208984375</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
147
+ </edge>
148
+ <edge id="e3" source="77e4e920-0e05-11ee-83c2-430175bac8b6" target="HOST-2706">
149
+ <data key="e_type">INCIDENT_LINK</data>
150
+ <data key="e_timestamp">1690970141</data>
151
+ <data key="e_label_binary">malicious</data>
152
+ <data key="e_label_confidence">0.9208984375</data>
153
+ <data key="e_suspicion_score">0.9208984375</data>
154
+ <data key="e_mo_name">Data Theft</data>
155
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
156
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
157
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
158
+ <data key="e_lifecycle_stage">complete-mission</data>
159
+ <data key="e_disposition">Disrupted</data>
160
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
161
+ </edge>
162
+ <edge id="e4" source="HOST-2706" target="77e4e920-0e05-11ee-83c2-430175bac8b6">
163
+ <data key="e_type">INCIDENT_LINK</data>
164
+ <data key="e_timestamp">1690970141</data>
165
+ <data key="e_label_binary">malicious</data>
166
+ <data key="e_label_confidence">0.9208984375</data>
167
+ <data key="e_suspicion_score">0.9208984375</data>
168
+ <data key="e_mo_name">Data Theft</data>
169
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
170
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
171
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
172
+ <data key="e_lifecycle_stage">complete-mission</data>
173
+ <data key="e_disposition">Disrupted</data>
174
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
175
+ </edge>
176
+ <edge id="e5" source="3971ef62-259f-11ee-a116-af2c3a0e2f1a" target="HOST-2706">
177
+ <data key="e_type">INCIDENT_LINK</data>
178
+ <data key="e_timestamp">1690970141</data>
179
+ <data key="e_label_binary">malicious</data>
180
+ <data key="e_label_confidence">0.9208984375</data>
181
+ <data key="e_suspicion_score">0.9208984375</data>
182
+ <data key="e_mo_name">Data Theft</data>
183
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
184
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
185
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
186
+ <data key="e_lifecycle_stage">complete-mission</data>
187
+ <data key="e_disposition">Disrupted</data>
188
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
189
+ </edge>
190
+ <edge id="e6" source="HOST-2706" target="3971ef62-259f-11ee-a116-af2c3a0e2f1a">
191
+ <data key="e_type">INCIDENT_LINK</data>
192
+ <data key="e_timestamp">1690970141</data>
193
+ <data key="e_label_binary">malicious</data>
194
+ <data key="e_label_confidence">0.9208984375</data>
195
+ <data key="e_suspicion_score">0.9208984375</data>
196
+ <data key="e_mo_name">Data Theft</data>
197
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
198
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
199
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
200
+ <data key="e_lifecycle_stage">complete-mission</data>
201
+ <data key="e_disposition">Disrupted</data>
202
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
203
+ </edge>
204
+ <edge id="e7" source="69420c40-2705-11ee-96f7-ef9658dca3bb" target="HOST-2706">
205
+ <data key="e_type">INCIDENT_LINK</data>
206
+ <data key="e_timestamp">1690970141</data>
207
+ <data key="e_label_binary">malicious</data>
208
+ <data key="e_label_confidence">0.9208984375</data>
209
+ <data key="e_suspicion_score">0.9208984375</data>
210
+ <data key="e_mo_name">Data Theft</data>
211
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
212
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
213
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
214
+ <data key="e_lifecycle_stage">complete-mission</data>
215
+ <data key="e_disposition">Disrupted</data>
216
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
217
+ </edge>
218
+ <edge id="e8" source="HOST-2706" target="69420c40-2705-11ee-96f7-ef9658dca3bb">
219
+ <data key="e_type">INCIDENT_LINK</data>
220
+ <data key="e_timestamp">1690970141</data>
221
+ <data key="e_label_binary">malicious</data>
222
+ <data key="e_label_confidence">0.9208984375</data>
223
+ <data key="e_suspicion_score">0.9208984375</data>
224
+ <data key="e_mo_name">Data Theft</data>
225
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
226
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
227
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
228
+ <data key="e_lifecycle_stage">complete-mission</data>
229
+ <data key="e_disposition">Disrupted</data>
230
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
231
+ </edge>
232
+ <edge id="e9" source="f2420741-12b8-11ee-9c7e-07083ed7c247" target="HOST-2706">
233
+ <data key="e_type">INCIDENT_LINK</data>
234
+ <data key="e_timestamp">1690970141</data>
235
+ <data key="e_label_binary">malicious</data>
236
+ <data key="e_label_confidence">0.9208984375</data>
237
+ <data key="e_suspicion_score">0.9208984375</data>
238
+ <data key="e_mo_name">Data Theft</data>
239
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
240
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
241
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
242
+ <data key="e_lifecycle_stage">complete-mission</data>
243
+ <data key="e_disposition">Disrupted</data>
244
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
245
+ </edge>
246
+ <edge id="e10" source="HOST-2706" target="f2420741-12b8-11ee-9c7e-07083ed7c247">
247
+ <data key="e_type">INCIDENT_LINK</data>
248
+ <data key="e_timestamp">1690970141</data>
249
+ <data key="e_label_binary">malicious</data>
250
+ <data key="e_label_confidence">0.9208984375</data>
251
+ <data key="e_suspicion_score">0.9208984375</data>
252
+ <data key="e_mo_name">Data Theft</data>
253
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
254
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
255
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
256
+ <data key="e_lifecycle_stage">complete-mission</data>
257
+ <data key="e_disposition">Disrupted</data>
258
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
259
+ </edge>
260
+ <edge id="e11" source="ff15d616-3106-11ee-ad50-4366968404b1" target="HOST-2706">
261
+ <data key="e_type">INCIDENT_LINK</data>
262
+ <data key="e_timestamp">1690970141</data>
263
+ <data key="e_label_binary">malicious</data>
264
+ <data key="e_label_confidence">0.9208984375</data>
265
+ <data key="e_suspicion_score">0.9208984375</data>
266
+ <data key="e_mo_name">Data Theft</data>
267
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
268
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
269
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
270
+ <data key="e_lifecycle_stage">complete-mission</data>
271
+ <data key="e_disposition">Disrupted</data>
272
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
273
+ </edge>
274
+ <edge id="e12" source="HOST-2706" target="ff15d616-3106-11ee-ad50-4366968404b1">
275
+ <data key="e_type">INCIDENT_LINK</data>
276
+ <data key="e_timestamp">1690970141</data>
277
+ <data key="e_label_binary">malicious</data>
278
+ <data key="e_label_confidence">0.9208984375</data>
279
+ <data key="e_suspicion_score">0.9208984375</data>
280
+ <data key="e_mo_name">Data Theft</data>
281
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
282
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
283
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
284
+ <data key="e_lifecycle_stage">complete-mission</data>
285
+ <data key="e_disposition">Disrupted</data>
286
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
287
+ </edge>
288
+ <edge id="e13" source="31021680-2517-11ee-bbc8-db39ada6e4de" target="HOST-2706">
289
+ <data key="e_type">INCIDENT_LINK</data>
290
+ <data key="e_timestamp">1690970141</data>
291
+ <data key="e_label_binary">malicious</data>
292
+ <data key="e_label_confidence">0.9208984375</data>
293
+ <data key="e_suspicion_score">0.9208984375</data>
294
+ <data key="e_mo_name">Data Theft</data>
295
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
296
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
297
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
298
+ <data key="e_lifecycle_stage">complete-mission</data>
299
+ <data key="e_disposition">Disrupted</data>
300
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
301
+ </edge>
302
+ <edge id="e14" source="HOST-2706" target="31021680-2517-11ee-bbc8-db39ada6e4de">
303
+ <data key="e_type">INCIDENT_LINK</data>
304
+ <data key="e_timestamp">1690970141</data>
305
+ <data key="e_label_binary">malicious</data>
306
+ <data key="e_label_confidence">0.9208984375</data>
307
+ <data key="e_suspicion_score">0.9208984375</data>
308
+ <data key="e_mo_name">Data Theft</data>
309
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
310
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
311
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
312
+ <data key="e_lifecycle_stage">complete-mission</data>
313
+ <data key="e_disposition">Disrupted</data>
314
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
315
+ </edge>
316
+ <edge id="e15" source="77e4e920-0e05-11ee-83c2-430175bac8b6" target="HOST-2717">
317
+ <data key="e_type">INCIDENT_LINK</data>
318
+ <data key="e_timestamp">1690970141</data>
319
+ <data key="e_label_binary">malicious</data>
320
+ <data key="e_label_confidence">0.9208984375</data>
321
+ <data key="e_suspicion_score">0.9208984375</data>
322
+ <data key="e_mo_name">Data Theft</data>
323
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
324
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
325
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
326
+ <data key="e_lifecycle_stage">complete-mission</data>
327
+ <data key="e_disposition">Disrupted</data>
328
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
329
+ </edge>
330
+ <edge id="e16" source="HOST-2706" target="HOST-3343">
331
+ <data key="e_type">INCIDENT_LINK</data>
332
+ <data key="e_timestamp">1690970141</data>
333
+ <data key="e_label_binary">malicious</data>
334
+ <data key="e_label_confidence">0.9208984375</data>
335
+ <data key="e_suspicion_score">0.9208984375</data>
336
+ <data key="e_mo_name">Data Theft</data>
337
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
338
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
339
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
340
+ <data key="e_lifecycle_stage">complete-mission</data>
341
+ <data key="e_disposition">Disrupted</data>
342
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
343
+ </edge>
344
+ <edge id="e17" source="HOST-3343" target="HOST-2706">
345
+ <data key="e_type">INCIDENT_LINK</data>
346
+ <data key="e_timestamp">1690970141</data>
347
+ <data key="e_label_binary">malicious</data>
348
+ <data key="e_label_confidence">0.9208984375</data>
349
+ <data key="e_suspicion_score">0.9208984375</data>
350
+ <data key="e_mo_name">Data Theft</data>
351
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
352
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
353
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
354
+ <data key="e_lifecycle_stage">complete-mission</data>
355
+ <data key="e_disposition">Disrupted</data>
356
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
357
+ </edge>
358
+ <edge id="e18" source="051448f2-310f-11ee-9ac0-efae50d8c2ef" target="HOST-2706">
359
+ <data key="e_type">INCIDENT_LINK</data>
360
+ <data key="e_timestamp">1690970141</data>
361
+ <data key="e_label_binary">malicious</data>
362
+ <data key="e_label_confidence">0.9208984375</data>
363
+ <data key="e_suspicion_score">0.9208984375</data>
364
+ <data key="e_mo_name">Data Theft</data>
365
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
366
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
367
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
368
+ <data key="e_lifecycle_stage">complete-mission</data>
369
+ <data key="e_disposition">Disrupted</data>
370
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
371
+ </edge>
372
+ <edge id="e19" source="HOST-2706" target="051448f2-310f-11ee-9ac0-efae50d8c2ef">
373
+ <data key="e_type">INCIDENT_LINK</data>
374
+ <data key="e_timestamp">1690970141</data>
375
+ <data key="e_label_binary">malicious</data>
376
+ <data key="e_label_confidence">0.9208984375</data>
377
+ <data key="e_suspicion_score">0.9208984375</data>
378
+ <data key="e_mo_name">Data Theft</data>
379
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
380
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
381
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
382
+ <data key="e_lifecycle_stage">complete-mission</data>
383
+ <data key="e_disposition">Disrupted</data>
384
+ <data key="e_incident_id">bdb21760-311a-11ee-87a2-613e036775fd</data>
385
+ </edge>
386
+ </graph>
387
+ </graphml>
graph/incidents_graphml/b/bdb25870-5bee-11ee-82a0-9da780b0dcc4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ebb52292-0624-11ee-a48a-ff0b3de2e266">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.12.202</data>
35
+ <data key="n_hostname">100.64.12.202</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.232.220</data>
43
+ <data key="n_hostname">172.16.232.220</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3462" target="HOST-2748">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695679143</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">bdb25870-5bee-11ee-82a0-9da780b0dcc4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdb2b730-6c00-11ee-9973-9b86183b2cfc.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c288b2a3-537d-11ee-a2a3-bfa286121a5f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">10.74.211.215</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="bcc215a3-6c00-11ee-b94f-d7e01e6af6af">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.90.14</data>
43
+ <data key="n_hostname">100.64.90.14</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17154" target="HOST-17873">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697446093</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">bdb2b730-6c00-11ee-9973-9b86183b2cfc</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdb6d7c0-131d-11ee-8854-7b8acd154f2f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.6.172</data>
35
+ <data key="n_hostname">172.31.6.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="62676423-0ab7-11ee-8866-d3f889652490">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.53.34</data>
43
+ <data key="n_hostname">100.64.53.34</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2757" target="HOST-9166">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687672895</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">bdb6d7c0-131d-11ee-8854-7b8acd154f2f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdb75c00-a166-11ed-863f-a161c6cf34a1.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5dd003a0-9d88-11ed-8ff2-3593b92fed96">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">192.168.107.156</data>
35
+ <data key="n_hostname">192.168.107.156</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="58bc8855-a136-11ed-96d6-9b6ff1c0106e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.86.211</data>
43
+ <data key="n_hostname">100.64.86.211</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="e1403cf1-9d88-11ed-a0d9-bbd531499cbc">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">192.168.17.89</data>
51
+ <data key="n_hostname">192.168.17.89</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="5dd003a0-9d88-11ed-8ff2-3593b92fed96" target="58bc8855-a136-11ed-96d6-9b6ff1c0106e">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1675169816</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.4375</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">bdb75c00-a166-11ed-863f-a161c6cf34a1</data>
69
+ </edge>
70
+ <edge id="e2" source="58bc8855-a136-11ed-96d6-9b6ff1c0106e" target="5dd003a0-9d88-11ed-8ff2-3593b92fed96">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1675169816</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.4375</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">bdb75c00-a166-11ed-863f-a161c6cf34a1</data>
83
+ </edge>
84
+ <edge id="e3" source="e1403cf1-9d88-11ed-a0d9-bbd531499cbc" target="58bc8855-a136-11ed-96d6-9b6ff1c0106e">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1675169816</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.7</data>
89
+ <data key="e_suspicion_score">0.4375</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">bdb75c00-a166-11ed-863f-a161c6cf34a1</data>
97
+ </edge>
98
+ <edge id="e4" source="58bc8855-a136-11ed-96d6-9b6ff1c0106e" target="e1403cf1-9d88-11ed-a0d9-bbd531499cbc">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1675169816</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.7</data>
103
+ <data key="e_suspicion_score">0.4375</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">bdb75c00-a166-11ed-863f-a161c6cf34a1</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/b/bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f.graphml ADDED
@@ -0,0 +1,825 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ec44df74-0624-11ee-9792-13ac4ddb104c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.52.86</data>
35
+ <data key="n_hostname">100.64.52.86</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.22.127.96</data>
43
+ <data key="n_hostname">172.22.127.96</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="829dbde4-cf3b-11ee-8bb2-c5ff1802c79c">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.52.87</data>
51
+ <data key="n_hostname">100.64.52.87</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="badb7d41-0624-11ee-a48a-ff0b3de2e266">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.52.88</data>
59
+ <data key="n_hostname">100.64.52.88</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="4774eb40-0627-11ee-8860-f951c26910c1">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.13.219</data>
67
+ <data key="n_hostname">100.64.13.219</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="19aca8f0-cf3b-11ee-a48b-75f5badf3578">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.52.89</data>
75
+ <data key="n_hostname">100.64.52.89</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">172.16.232.220</data>
83
+ <data key="n_hostname">172.16.232.220</data>
84
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="5afed340-aabb-11ee-8161-899d5b9a9801">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.52.90</data>
91
+ <data key="n_hostname">100.64.52.90</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="2f0075e5-0625-11ee-bea9-5f52a09eb73a">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">172.18.96.192</data>
99
+ <data key="n_hostname">172.18.96.192</data>
100
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="4c26c575-0625-11ee-a360-0d0424c09388">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.52.91</data>
107
+ <data key="n_hostname">100.64.52.91</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.25</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="f2a24d22-062a-11ee-aa9e-a71a1423ad66">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.52.92</data>
115
+ <data key="n_hostname">100.64.52.92</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.25</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="a2de90e0-aabd-11ee-aaef-21351945c4a2">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.24.74</data>
123
+ <data key="n_hostname">100.64.24.74</data>
124
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
125
+ <data key="n_suspicion_score">0.25</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">172.30.174.172</data>
131
+ <data key="n_hostname">172.30.174.172</data>
132
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.25</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="46178052-0636-11ee-973d-c176e777c94a">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.37.239</data>
139
+ <data key="n_hostname">100.64.37.239</data>
140
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
141
+ <data key="n_suspicion_score">0.25</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <node id="51c3bc80-290d-11ee-99ed-1755463db0de">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.52.93</data>
147
+ <data key="n_hostname">USER-0015-1396.example.internal</data>
148
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
149
+ <data key="n_suspicion_score">0.25</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <node id="e2d98983-06a2-11ee-bd15-7bc0b6ea3f89">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.23.63</data>
155
+ <data key="n_hostname">100.64.23.63</data>
156
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
157
+ <data key="n_suspicion_score">0.25</data>
158
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
159
+ </node>
160
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">172.26.23.117</data>
163
+ <data key="n_hostname">172.26.23.117</data>
164
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
165
+ <data key="n_suspicion_score">0.25</data>
166
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
167
+ </node>
168
+ <node id="38091ca0-cf3d-11ee-bdf1-43d1affd7388">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">100.64.51.170</data>
171
+ <data key="n_hostname">100.64.51.170</data>
172
+ <data key="n_set_roles">["Exploiting Host"]</data>
173
+ <data key="n_suspicion_score">0.25</data>
174
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
175
+ </node>
176
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">172.27.202.53</data>
179
+ <data key="n_hostname">172.27.202.53</data>
180
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
181
+ <data key="n_suspicion_score">0.25</data>
182
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
183
+ </node>
184
+ <node id="e2ab7ff0-cf69-11ee-b6ee-a173b75d092a">
185
+ <data key="n_type">HOST</data>
186
+ <data key="n_ip">100.64.52.94</data>
187
+ <data key="n_hostname">100.64.52.94</data>
188
+ <data key="n_set_roles">["Exploiting Host"]</data>
189
+ <data key="n_suspicion_score">0.25</data>
190
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
191
+ </node>
192
+ <node id="8e420a70-bc12-11ee-9be3-bbac05820e8c">
193
+ <data key="n_type">HOST</data>
194
+ <data key="n_ip">100.64.22.14</data>
195
+ <data key="n_hostname">100.64.22.14</data>
196
+ <data key="n_set_roles">["Exploiting Host"]</data>
197
+ <data key="n_suspicion_score">0.25</data>
198
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
199
+ </node>
200
+ <node id="18fbb580-0827-11ee-9cde-69be8eab0946">
201
+ <data key="n_type">HOST</data>
202
+ <data key="n_ip">100.64.8.150</data>
203
+ <data key="n_hostname">HOST-2906</data>
204
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
205
+ <data key="n_suspicion_score">0.25</data>
206
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
207
+ </node>
208
+ <edge id="e1" source="ec44df74-0624-11ee-9792-13ac4ddb104c" target="HOST-2726">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1708376785</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.7</data>
213
+ <data key="e_suspicion_score">0.25</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Unprocessed</data>
220
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
221
+ </edge>
222
+ <edge id="e2" source="HOST-2726" target="ec44df74-0624-11ee-9792-13ac4ddb104c">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1708376785</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.7</data>
227
+ <data key="e_suspicion_score">0.25</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Unprocessed</data>
234
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
235
+ </edge>
236
+ <edge id="e3" source="829dbde4-cf3b-11ee-8bb2-c5ff1802c79c" target="HOST-2726">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1708376785</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.7</data>
241
+ <data key="e_suspicion_score">0.25</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Unprocessed</data>
248
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
249
+ </edge>
250
+ <edge id="e4" source="HOST-2726" target="829dbde4-cf3b-11ee-8bb2-c5ff1802c79c">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1708376785</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.7</data>
255
+ <data key="e_suspicion_score">0.25</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Unprocessed</data>
262
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
263
+ </edge>
264
+ <edge id="e5" source="badb7d41-0624-11ee-a48a-ff0b3de2e266" target="HOST-2726">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1708376785</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.7</data>
269
+ <data key="e_suspicion_score">0.25</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Unprocessed</data>
276
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
277
+ </edge>
278
+ <edge id="e6" source="HOST-2726" target="badb7d41-0624-11ee-a48a-ff0b3de2e266">
279
+ <data key="e_type">INCIDENT_LINK</data>
280
+ <data key="e_timestamp">1708376785</data>
281
+ <data key="e_label_binary">malicious</data>
282
+ <data key="e_label_confidence">0.7</data>
283
+ <data key="e_suspicion_score">0.25</data>
284
+ <data key="e_mo_name">Data Theft</data>
285
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
286
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
287
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
288
+ <data key="e_lifecycle_stage">complete-mission</data>
289
+ <data key="e_disposition">Unprocessed</data>
290
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
291
+ </edge>
292
+ <edge id="e7" source="HOST-2726" target="HOST-3617">
293
+ <data key="e_type">INCIDENT_LINK</data>
294
+ <data key="e_timestamp">1708376785</data>
295
+ <data key="e_label_binary">malicious</data>
296
+ <data key="e_label_confidence">0.7</data>
297
+ <data key="e_suspicion_score">0.25</data>
298
+ <data key="e_mo_name">Data Theft</data>
299
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
300
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
301
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
302
+ <data key="e_lifecycle_stage">complete-mission</data>
303
+ <data key="e_disposition">Unprocessed</data>
304
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
305
+ </edge>
306
+ <edge id="e8" source="HOST-3617" target="HOST-2726">
307
+ <data key="e_type">INCIDENT_LINK</data>
308
+ <data key="e_timestamp">1708376785</data>
309
+ <data key="e_label_binary">malicious</data>
310
+ <data key="e_label_confidence">0.7</data>
311
+ <data key="e_suspicion_score">0.25</data>
312
+ <data key="e_mo_name">Data Theft</data>
313
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
314
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
315
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
316
+ <data key="e_lifecycle_stage">complete-mission</data>
317
+ <data key="e_disposition">Unprocessed</data>
318
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
319
+ </edge>
320
+ <edge id="e9" source="19aca8f0-cf3b-11ee-a48b-75f5badf3578" target="HOST-2748">
321
+ <data key="e_type">INCIDENT_LINK</data>
322
+ <data key="e_timestamp">1708376785</data>
323
+ <data key="e_label_binary">malicious</data>
324
+ <data key="e_label_confidence">0.7</data>
325
+ <data key="e_suspicion_score">0.25</data>
326
+ <data key="e_mo_name">Data Theft</data>
327
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
328
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
329
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
330
+ <data key="e_lifecycle_stage">complete-mission</data>
331
+ <data key="e_disposition">Unprocessed</data>
332
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
333
+ </edge>
334
+ <edge id="e10" source="HOST-2748" target="19aca8f0-cf3b-11ee-a48b-75f5badf3578">
335
+ <data key="e_type">INCIDENT_LINK</data>
336
+ <data key="e_timestamp">1708376785</data>
337
+ <data key="e_label_binary">malicious</data>
338
+ <data key="e_label_confidence">0.7</data>
339
+ <data key="e_suspicion_score">0.25</data>
340
+ <data key="e_mo_name">Data Theft</data>
341
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
342
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
343
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
344
+ <data key="e_lifecycle_stage">complete-mission</data>
345
+ <data key="e_disposition">Unprocessed</data>
346
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
347
+ </edge>
348
+ <edge id="e11" source="5afed340-aabb-11ee-8161-899d5b9a9801" target="HOST-2715">
349
+ <data key="e_type">INCIDENT_LINK</data>
350
+ <data key="e_timestamp">1708376785</data>
351
+ <data key="e_label_binary">malicious</data>
352
+ <data key="e_label_confidence">0.7</data>
353
+ <data key="e_suspicion_score">0.25</data>
354
+ <data key="e_mo_name">Data Theft</data>
355
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
356
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
357
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
358
+ <data key="e_lifecycle_stage">complete-mission</data>
359
+ <data key="e_disposition">Unprocessed</data>
360
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
361
+ </edge>
362
+ <edge id="e12" source="HOST-2715" target="5afed340-aabb-11ee-8161-899d5b9a9801">
363
+ <data key="e_type">INCIDENT_LINK</data>
364
+ <data key="e_timestamp">1708376785</data>
365
+ <data key="e_label_binary">malicious</data>
366
+ <data key="e_label_confidence">0.7</data>
367
+ <data key="e_suspicion_score">0.25</data>
368
+ <data key="e_mo_name">Data Theft</data>
369
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
370
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
371
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
372
+ <data key="e_lifecycle_stage">complete-mission</data>
373
+ <data key="e_disposition">Unprocessed</data>
374
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
375
+ </edge>
376
+ <edge id="e13" source="19aca8f0-cf3b-11ee-a48b-75f5badf3578" target="HOST-2715">
377
+ <data key="e_type">INCIDENT_LINK</data>
378
+ <data key="e_timestamp">1708376785</data>
379
+ <data key="e_label_binary">malicious</data>
380
+ <data key="e_label_confidence">0.7</data>
381
+ <data key="e_suspicion_score">0.25</data>
382
+ <data key="e_mo_name">Data Theft</data>
383
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
384
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
385
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
386
+ <data key="e_lifecycle_stage">complete-mission</data>
387
+ <data key="e_disposition">Unprocessed</data>
388
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
389
+ </edge>
390
+ <edge id="e14" source="HOST-2715" target="19aca8f0-cf3b-11ee-a48b-75f5badf3578">
391
+ <data key="e_type">INCIDENT_LINK</data>
392
+ <data key="e_timestamp">1708376785</data>
393
+ <data key="e_label_binary">malicious</data>
394
+ <data key="e_label_confidence">0.7</data>
395
+ <data key="e_suspicion_score">0.25</data>
396
+ <data key="e_mo_name">Data Theft</data>
397
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
398
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
399
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
400
+ <data key="e_lifecycle_stage">complete-mission</data>
401
+ <data key="e_disposition">Unprocessed</data>
402
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
403
+ </edge>
404
+ <edge id="e15" source="4c26c575-0625-11ee-a360-0d0424c09388" target="HOST-2715">
405
+ <data key="e_type">INCIDENT_LINK</data>
406
+ <data key="e_timestamp">1708376785</data>
407
+ <data key="e_label_binary">malicious</data>
408
+ <data key="e_label_confidence">0.7</data>
409
+ <data key="e_suspicion_score">0.25</data>
410
+ <data key="e_mo_name">Data Theft</data>
411
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
412
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
413
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
414
+ <data key="e_lifecycle_stage">complete-mission</data>
415
+ <data key="e_disposition">Unprocessed</data>
416
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
417
+ </edge>
418
+ <edge id="e16" source="HOST-2715" target="4c26c575-0625-11ee-a360-0d0424c09388">
419
+ <data key="e_type">INCIDENT_LINK</data>
420
+ <data key="e_timestamp">1708376785</data>
421
+ <data key="e_label_binary">malicious</data>
422
+ <data key="e_label_confidence">0.7</data>
423
+ <data key="e_suspicion_score">0.25</data>
424
+ <data key="e_mo_name">Data Theft</data>
425
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
426
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
427
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
428
+ <data key="e_lifecycle_stage">complete-mission</data>
429
+ <data key="e_disposition">Unprocessed</data>
430
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
431
+ </edge>
432
+ <edge id="e17" source="f2a24d22-062a-11ee-aa9e-a71a1423ad66" target="HOST-2715">
433
+ <data key="e_type">INCIDENT_LINK</data>
434
+ <data key="e_timestamp">1708376785</data>
435
+ <data key="e_label_binary">malicious</data>
436
+ <data key="e_label_confidence">0.7</data>
437
+ <data key="e_suspicion_score">0.25</data>
438
+ <data key="e_mo_name">Data Theft</data>
439
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
440
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
441
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
442
+ <data key="e_lifecycle_stage">complete-mission</data>
443
+ <data key="e_disposition">Unprocessed</data>
444
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
445
+ </edge>
446
+ <edge id="e18" source="HOST-2715" target="f2a24d22-062a-11ee-aa9e-a71a1423ad66">
447
+ <data key="e_type">INCIDENT_LINK</data>
448
+ <data key="e_timestamp">1708376785</data>
449
+ <data key="e_label_binary">malicious</data>
450
+ <data key="e_label_confidence">0.7</data>
451
+ <data key="e_suspicion_score">0.25</data>
452
+ <data key="e_mo_name">Data Theft</data>
453
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
454
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
455
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
456
+ <data key="e_lifecycle_stage">complete-mission</data>
457
+ <data key="e_disposition">Unprocessed</data>
458
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
459
+ </edge>
460
+ <edge id="e19" source="a2de90e0-aabd-11ee-aaef-21351945c4a2" target="HOST-2946">
461
+ <data key="e_type">INCIDENT_LINK</data>
462
+ <data key="e_timestamp">1708376785</data>
463
+ <data key="e_label_binary">malicious</data>
464
+ <data key="e_label_confidence">0.7</data>
465
+ <data key="e_suspicion_score">0.25</data>
466
+ <data key="e_mo_name">Data Theft</data>
467
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
468
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
469
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
470
+ <data key="e_lifecycle_stage">complete-mission</data>
471
+ <data key="e_disposition">Unprocessed</data>
472
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
473
+ </edge>
474
+ <edge id="e20" source="HOST-2946" target="a2de90e0-aabd-11ee-aaef-21351945c4a2">
475
+ <data key="e_type">INCIDENT_LINK</data>
476
+ <data key="e_timestamp">1708376785</data>
477
+ <data key="e_label_binary">malicious</data>
478
+ <data key="e_label_confidence">0.7</data>
479
+ <data key="e_suspicion_score">0.25</data>
480
+ <data key="e_mo_name">Data Theft</data>
481
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
482
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
483
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
484
+ <data key="e_lifecycle_stage">complete-mission</data>
485
+ <data key="e_disposition">Unprocessed</data>
486
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
487
+ </edge>
488
+ <edge id="e21" source="19aca8f0-cf3b-11ee-a48b-75f5badf3578" target="HOST-2946">
489
+ <data key="e_type">INCIDENT_LINK</data>
490
+ <data key="e_timestamp">1708376785</data>
491
+ <data key="e_label_binary">malicious</data>
492
+ <data key="e_label_confidence">0.7</data>
493
+ <data key="e_suspicion_score">0.25</data>
494
+ <data key="e_mo_name">Data Theft</data>
495
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
496
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
497
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
498
+ <data key="e_lifecycle_stage">complete-mission</data>
499
+ <data key="e_disposition">Unprocessed</data>
500
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
501
+ </edge>
502
+ <edge id="e22" source="HOST-2946" target="19aca8f0-cf3b-11ee-a48b-75f5badf3578">
503
+ <data key="e_type">INCIDENT_LINK</data>
504
+ <data key="e_timestamp">1708376785</data>
505
+ <data key="e_label_binary">malicious</data>
506
+ <data key="e_label_confidence">0.7</data>
507
+ <data key="e_suspicion_score">0.25</data>
508
+ <data key="e_mo_name">Data Theft</data>
509
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
510
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
511
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
512
+ <data key="e_lifecycle_stage">complete-mission</data>
513
+ <data key="e_disposition">Unprocessed</data>
514
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
515
+ </edge>
516
+ <edge id="e23" source="HOST-7533" target="HOST-2748">
517
+ <data key="e_type">INCIDENT_LINK</data>
518
+ <data key="e_timestamp">1708376785</data>
519
+ <data key="e_label_binary">malicious</data>
520
+ <data key="e_label_confidence">0.7</data>
521
+ <data key="e_suspicion_score">0.25</data>
522
+ <data key="e_mo_name">Data Theft</data>
523
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
524
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
525
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
526
+ <data key="e_lifecycle_stage">complete-mission</data>
527
+ <data key="e_disposition">Unprocessed</data>
528
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
529
+ </edge>
530
+ <edge id="e24" source="HOST-2748" target="HOST-7533">
531
+ <data key="e_type">INCIDENT_LINK</data>
532
+ <data key="e_timestamp">1708376785</data>
533
+ <data key="e_label_binary">malicious</data>
534
+ <data key="e_label_confidence">0.7</data>
535
+ <data key="e_suspicion_score">0.25</data>
536
+ <data key="e_mo_name">Data Theft</data>
537
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
538
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
539
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
540
+ <data key="e_lifecycle_stage">complete-mission</data>
541
+ <data key="e_disposition">Unprocessed</data>
542
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
543
+ </edge>
544
+ <edge id="e25" source="829dbde4-cf3b-11ee-8bb2-c5ff1802c79c" target="HOST-2748">
545
+ <data key="e_type">INCIDENT_LINK</data>
546
+ <data key="e_timestamp">1708376785</data>
547
+ <data key="e_label_binary">malicious</data>
548
+ <data key="e_label_confidence">0.7</data>
549
+ <data key="e_suspicion_score">0.25</data>
550
+ <data key="e_mo_name">Data Theft</data>
551
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
552
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
553
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
554
+ <data key="e_lifecycle_stage">complete-mission</data>
555
+ <data key="e_disposition">Unprocessed</data>
556
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
557
+ </edge>
558
+ <edge id="e26" source="HOST-2748" target="829dbde4-cf3b-11ee-8bb2-c5ff1802c79c">
559
+ <data key="e_type">INCIDENT_LINK</data>
560
+ <data key="e_timestamp">1708376785</data>
561
+ <data key="e_label_binary">malicious</data>
562
+ <data key="e_label_confidence">0.7</data>
563
+ <data key="e_suspicion_score">0.25</data>
564
+ <data key="e_mo_name">Data Theft</data>
565
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
566
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
567
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
568
+ <data key="e_lifecycle_stage">complete-mission</data>
569
+ <data key="e_disposition">Unprocessed</data>
570
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
571
+ </edge>
572
+ <edge id="e27" source="HOST-2726" target="51c3bc80-290d-11ee-99ed-1755463db0de">
573
+ <data key="e_type">INCIDENT_LINK</data>
574
+ <data key="e_timestamp">1708376785</data>
575
+ <data key="e_label_binary">malicious</data>
576
+ <data key="e_label_confidence">0.7</data>
577
+ <data key="e_suspicion_score">0.25</data>
578
+ <data key="e_mo_name">Data Theft</data>
579
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
580
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
581
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
582
+ <data key="e_lifecycle_stage">complete-mission</data>
583
+ <data key="e_disposition">Unprocessed</data>
584
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
585
+ </edge>
586
+ <edge id="e28" source="HOST-4907" target="HOST-2824">
587
+ <data key="e_type">INCIDENT_LINK</data>
588
+ <data key="e_timestamp">1708376785</data>
589
+ <data key="e_label_binary">malicious</data>
590
+ <data key="e_label_confidence">0.7</data>
591
+ <data key="e_suspicion_score">0.25</data>
592
+ <data key="e_mo_name">Data Theft</data>
593
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
594
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
595
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
596
+ <data key="e_lifecycle_stage">complete-mission</data>
597
+ <data key="e_disposition">Unprocessed</data>
598
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
599
+ </edge>
600
+ <edge id="e29" source="HOST-2824" target="HOST-4907">
601
+ <data key="e_type">INCIDENT_LINK</data>
602
+ <data key="e_timestamp">1708376785</data>
603
+ <data key="e_label_binary">malicious</data>
604
+ <data key="e_label_confidence">0.7</data>
605
+ <data key="e_suspicion_score">0.25</data>
606
+ <data key="e_mo_name">Data Theft</data>
607
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
608
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
609
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
610
+ <data key="e_lifecycle_stage">complete-mission</data>
611
+ <data key="e_disposition">Unprocessed</data>
612
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
613
+ </edge>
614
+ <edge id="e30" source="19aca8f0-cf3b-11ee-a48b-75f5badf3578" target="HOST-2824">
615
+ <data key="e_type">INCIDENT_LINK</data>
616
+ <data key="e_timestamp">1708376785</data>
617
+ <data key="e_label_binary">malicious</data>
618
+ <data key="e_label_confidence">0.7</data>
619
+ <data key="e_suspicion_score">0.25</data>
620
+ <data key="e_mo_name">Data Theft</data>
621
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
622
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
623
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
624
+ <data key="e_lifecycle_stage">complete-mission</data>
625
+ <data key="e_disposition">Unprocessed</data>
626
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
627
+ </edge>
628
+ <edge id="e31" source="HOST-2824" target="19aca8f0-cf3b-11ee-a48b-75f5badf3578">
629
+ <data key="e_type">INCIDENT_LINK</data>
630
+ <data key="e_timestamp">1708376785</data>
631
+ <data key="e_label_binary">malicious</data>
632
+ <data key="e_label_confidence">0.7</data>
633
+ <data key="e_suspicion_score">0.25</data>
634
+ <data key="e_mo_name">Data Theft</data>
635
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
636
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
637
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
638
+ <data key="e_lifecycle_stage">complete-mission</data>
639
+ <data key="e_disposition">Unprocessed</data>
640
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
641
+ </edge>
642
+ <edge id="e32" source="HOST-8947" target="HOST-2703">
643
+ <data key="e_type">INCIDENT_LINK</data>
644
+ <data key="e_timestamp">1708376785</data>
645
+ <data key="e_label_binary">malicious</data>
646
+ <data key="e_label_confidence">0.7</data>
647
+ <data key="e_suspicion_score">0.25</data>
648
+ <data key="e_mo_name">Data Theft</data>
649
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
650
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
651
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
652
+ <data key="e_lifecycle_stage">complete-mission</data>
653
+ <data key="e_disposition">Unprocessed</data>
654
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
655
+ </edge>
656
+ <edge id="e33" source="HOST-2703" target="HOST-8947">
657
+ <data key="e_type">INCIDENT_LINK</data>
658
+ <data key="e_timestamp">1708376785</data>
659
+ <data key="e_label_binary">malicious</data>
660
+ <data key="e_label_confidence">0.7</data>
661
+ <data key="e_suspicion_score">0.25</data>
662
+ <data key="e_mo_name">Data Theft</data>
663
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
664
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
665
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
666
+ <data key="e_lifecycle_stage">complete-mission</data>
667
+ <data key="e_disposition">Unprocessed</data>
668
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
669
+ </edge>
670
+ <edge id="e34" source="e2ab7ff0-cf69-11ee-b6ee-a173b75d092a" target="HOST-2703">
671
+ <data key="e_type">INCIDENT_LINK</data>
672
+ <data key="e_timestamp">1708376785</data>
673
+ <data key="e_label_binary">malicious</data>
674
+ <data key="e_label_confidence">0.7</data>
675
+ <data key="e_suspicion_score">0.25</data>
676
+ <data key="e_mo_name">Data Theft</data>
677
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
678
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
679
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
680
+ <data key="e_lifecycle_stage">complete-mission</data>
681
+ <data key="e_disposition">Unprocessed</data>
682
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
683
+ </edge>
684
+ <edge id="e35" source="HOST-2703" target="e2ab7ff0-cf69-11ee-b6ee-a173b75d092a">
685
+ <data key="e_type">INCIDENT_LINK</data>
686
+ <data key="e_timestamp">1708376785</data>
687
+ <data key="e_label_binary">malicious</data>
688
+ <data key="e_label_confidence">0.7</data>
689
+ <data key="e_suspicion_score">0.25</data>
690
+ <data key="e_mo_name">Data Theft</data>
691
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
692
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
693
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
694
+ <data key="e_lifecycle_stage">complete-mission</data>
695
+ <data key="e_disposition">Unprocessed</data>
696
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
697
+ </edge>
698
+ <edge id="e36" source="19aca8f0-cf3b-11ee-a48b-75f5badf3578" target="HOST-2703">
699
+ <data key="e_type">INCIDENT_LINK</data>
700
+ <data key="e_timestamp">1708376785</data>
701
+ <data key="e_label_binary">malicious</data>
702
+ <data key="e_label_confidence">0.7</data>
703
+ <data key="e_suspicion_score">0.25</data>
704
+ <data key="e_mo_name">Data Theft</data>
705
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
706
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
707
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
708
+ <data key="e_lifecycle_stage">complete-mission</data>
709
+ <data key="e_disposition">Unprocessed</data>
710
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
711
+ </edge>
712
+ <edge id="e37" source="HOST-2703" target="19aca8f0-cf3b-11ee-a48b-75f5badf3578">
713
+ <data key="e_type">INCIDENT_LINK</data>
714
+ <data key="e_timestamp">1708376785</data>
715
+ <data key="e_label_binary">malicious</data>
716
+ <data key="e_label_confidence">0.7</data>
717
+ <data key="e_suspicion_score">0.25</data>
718
+ <data key="e_mo_name">Data Theft</data>
719
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
720
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
721
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
722
+ <data key="e_lifecycle_stage">complete-mission</data>
723
+ <data key="e_disposition">Unprocessed</data>
724
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
725
+ </edge>
726
+ <edge id="e38" source="HOST-4750" target="HOST-2748">
727
+ <data key="e_type">INCIDENT_LINK</data>
728
+ <data key="e_timestamp">1708376785</data>
729
+ <data key="e_label_binary">malicious</data>
730
+ <data key="e_label_confidence">0.7</data>
731
+ <data key="e_suspicion_score">0.25</data>
732
+ <data key="e_mo_name">Data Theft</data>
733
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
734
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
735
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
736
+ <data key="e_lifecycle_stage">complete-mission</data>
737
+ <data key="e_disposition">Unprocessed</data>
738
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
739
+ </edge>
740
+ <edge id="e39" source="HOST-2748" target="HOST-4750">
741
+ <data key="e_type">INCIDENT_LINK</data>
742
+ <data key="e_timestamp">1708376785</data>
743
+ <data key="e_label_binary">malicious</data>
744
+ <data key="e_label_confidence">0.7</data>
745
+ <data key="e_suspicion_score">0.25</data>
746
+ <data key="e_mo_name">Data Theft</data>
747
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
748
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
749
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
750
+ <data key="e_lifecycle_stage">complete-mission</data>
751
+ <data key="e_disposition">Unprocessed</data>
752
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
753
+ </edge>
754
+ <edge id="e40" source="HOST-2726" target="HOST-2913">
755
+ <data key="e_type">INCIDENT_LINK</data>
756
+ <data key="e_timestamp">1708376785</data>
757
+ <data key="e_label_binary">malicious</data>
758
+ <data key="e_label_confidence">0.7</data>
759
+ <data key="e_suspicion_score">0.25</data>
760
+ <data key="e_mo_name">Data Theft</data>
761
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
762
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
763
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
764
+ <data key="e_lifecycle_stage">complete-mission</data>
765
+ <data key="e_disposition">Unprocessed</data>
766
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
767
+ </edge>
768
+ <edge id="e41" source="51c3bc80-290d-11ee-99ed-1755463db0de" target="HOST-2715">
769
+ <data key="e_type">INCIDENT_LINK</data>
770
+ <data key="e_timestamp">1708376785</data>
771
+ <data key="e_label_binary">malicious</data>
772
+ <data key="e_label_confidence">0.7</data>
773
+ <data key="e_suspicion_score">0.25</data>
774
+ <data key="e_mo_name">Data Theft</data>
775
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
776
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
777
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
778
+ <data key="e_lifecycle_stage">complete-mission</data>
779
+ <data key="e_disposition">Unprocessed</data>
780
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
781
+ </edge>
782
+ <edge id="e42" source="HOST-2715" target="51c3bc80-290d-11ee-99ed-1755463db0de">
783
+ <data key="e_type">INCIDENT_LINK</data>
784
+ <data key="e_timestamp">1708376785</data>
785
+ <data key="e_label_binary">malicious</data>
786
+ <data key="e_label_confidence">0.7</data>
787
+ <data key="e_suspicion_score">0.25</data>
788
+ <data key="e_mo_name">Data Theft</data>
789
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
790
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
791
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
792
+ <data key="e_lifecycle_stage">complete-mission</data>
793
+ <data key="e_disposition">Unprocessed</data>
794
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
795
+ </edge>
796
+ <edge id="e43" source="HOST-4907" target="HOST-2748">
797
+ <data key="e_type">INCIDENT_LINK</data>
798
+ <data key="e_timestamp">1708376785</data>
799
+ <data key="e_label_binary">malicious</data>
800
+ <data key="e_label_confidence">0.7</data>
801
+ <data key="e_suspicion_score">0.25</data>
802
+ <data key="e_mo_name">Data Theft</data>
803
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
804
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
805
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
806
+ <data key="e_lifecycle_stage">complete-mission</data>
807
+ <data key="e_disposition">Unprocessed</data>
808
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
809
+ </edge>
810
+ <edge id="e44" source="HOST-2748" target="HOST-4907">
811
+ <data key="e_type">INCIDENT_LINK</data>
812
+ <data key="e_timestamp">1708376785</data>
813
+ <data key="e_label_binary">malicious</data>
814
+ <data key="e_label_confidence">0.7</data>
815
+ <data key="e_suspicion_score">0.25</data>
816
+ <data key="e_mo_name">Data Theft</data>
817
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
818
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
819
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
820
+ <data key="e_lifecycle_stage">complete-mission</data>
821
+ <data key="e_disposition">Unprocessed</data>
822
+ <data key="e_incident_id">bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f</data>
823
+ </edge>
824
+ </graph>
825
+ </graphml>
graph/incidents_graphml/b/bdbd55c0-2d5b-11ee-9400-61c78ce5335d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="41b00552-0627-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.19.51</data>
35
+ <data key="n_hostname">USER-0015-1418.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.86.34</data>
43
+ <data key="n_hostname">172.23.86.34</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="41b00552-0627-11ee-bb6d-91e4d286acbc" target="HOST-2717">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690558254</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">bdbd55c0-2d5b-11ee-9400-61c78ce5335d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdbdb370-ba66-11ed-ace2-c7d81fb15087.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ae4c91c2-b725-11ed-85c4-817a11d31ebb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.75.230</data>
35
+ <data key="n_hostname">100.64.75.230</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="f5eedb42-9d8b-11ed-9ba1-69c845a45d44">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.200</data>
43
+ <data key="n_hostname">100.64.72.200</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="ae4c91c2-b725-11ed-85c4-817a11d31ebb" target="f5eedb42-9d8b-11ed-9ba1-69c845a45d44">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1677918595</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">bdbdb370-ba66-11ed-ace2-c7d81fb15087</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdc10f10-6c00-11ee-9973-9b86183b2cfc.graphml ADDED
@@ -0,0 +1,107 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d9f63494-3aef-11ee-879d-95b58c5de2cb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.57.130</data>
35
+ <data key="n_hostname">100.64.57.130</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9ff29330-0627-11ee-ad14-25a724519715">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
47
+ </node>
48
+ <node id="c288b2a3-537d-11ee-a2a3-bfa286121a5f">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">10.74.211.215</data>
51
+ <data key="n_hostname">10.74.211.215</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]</data>
55
+ </node>
56
+ <node id="c6935663-3529-11ee-9075-d1549a39f834">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">10.184.211.180</data>
59
+ <data key="n_hostname">10.184.211.180</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]</data>
63
+ </node>
64
+ <edge id="e1" source="d9f63494-3aef-11ee-879d-95b58c5de2cb" target="HOST-16999">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1697446093</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.7</data>
69
+ <data key="e_suspicion_score">0.25</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Unprocessed</data>
76
+ <data key="e_incident_id">bdc10f10-6c00-11ee-9973-9b86183b2cfc</data>
77
+ </edge>
78
+ <edge id="e2" source="d9f63494-3aef-11ee-879d-95b58c5de2cb" target="HOST-17154">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1697446093</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.7</data>
83
+ <data key="e_suspicion_score">0.25</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Unprocessed</data>
90
+ <data key="e_incident_id">bdc10f10-6c00-11ee-9973-9b86183b2cfc</data>
91
+ </edge>
92
+ <edge id="e3" source="d9f63494-3aef-11ee-879d-95b58c5de2cb" target="HOST-17115">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1697446093</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.7</data>
97
+ <data key="e_suspicion_score">0.25</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Unprocessed</data>
104
+ <data key="e_incident_id">bdc10f10-6c00-11ee-9973-9b86183b2cfc</data>
105
+ </edge>
106
+ </graph>
107
+ </graphml>
graph/incidents_graphml/b/bdc19ab0-5bee-11ee-82a0-9da780b0dcc4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ebb52292-0624-11ee-a48a-ff0b3de2e266">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.12.202</data>
43
+ <data key="n_hostname">100.64.12.202</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2748" target="HOST-3462">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695679143</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">bdc19ab0-5bee-11ee-82a0-9da780b0dcc4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.208.219</data>
35
+ <data key="n_hostname">172.30.208.219</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="e27810c3-5700-11ee-a932-a17fa9a09b5b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.33.53</data>
43
+ <data key="n_hostname">100.64.33.53</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2823" target="HOST-6308">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1707951583</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdccd150-3d0d-11ee-ba1f-812391e2855d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bfe7c193-0624-11ee-8860-f951c26910c1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.66.32</data>
35
+ <data key="n_hostname">100.64.66.32</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.168.48</data>
43
+ <data key="n_hostname">172.30.168.48</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="bfe7c193-0624-11ee-8860-f951c26910c1" target="HOST-2842">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692283972</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">bdccd150-3d0d-11ee-ba1f-812391e2855d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdd07860-6c00-11ee-9973-9b86183b2cfc.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9ff29330-0627-11ee-ad14-25a724519715">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="d9f63494-3aef-11ee-879d-95b58c5de2cb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.57.130</data>
43
+ <data key="n_hostname">100.64.57.130</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16999" target="HOST-17874">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697446093</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">bdd07860-6c00-11ee-9973-9b86183b2cfc</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdea14f0-41fd-11ee-b97c-f959f41b9d07.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b0d69f82-1c24-11ee-8b27-872193f89e2b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.66.133</data>
35
+ <data key="n_hostname">100.64.66.133</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.191.229</data>
43
+ <data key="n_hostname">172.24.191.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="b0d69f82-1c24-11ee-8b27-872193f89e2b" target="HOST-2839">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692826856</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">bdea14f0-41fd-11ee-b97c-f959f41b9d07</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdeefa80-00b9-11ef-8b56-b9c5ad676a8a.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="188fd9d2-06b2-11ee-be12-2bca84bf8424">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.168</data>
35
+ <data key="n_hostname">100.64.70.168</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.49375</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="af00dcda-0625-11ee-872d-37355cbb58d3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.38</data>
43
+ <data key="n_hostname">100.64.68.38</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.746875</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]</data>
47
+ </node>
48
+ <node id="d5efe9e4-9689-11ee-81a8-6b6681623387">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.70.93</data>
51
+ <data key="n_hostname">100.64.70.93</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.49375</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <node id="896b2261-2a64-11ee-a681-7bc82f570d8b">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.70.169</data>
59
+ <data key="n_hostname">USER-0015-1596.example.internal</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.49375</data>
62
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
63
+ </node>
64
+ <edge id="e1" source="188fd9d2-06b2-11ee-be12-2bca84bf8424" target="HOST-11397">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1713798322</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.746875</data>
69
+ <data key="e_suspicion_score">0.746875</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">bdeefa80-00b9-11ef-8b56-b9c5ad676a8a</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-11397" target="188fd9d2-06b2-11ee-be12-2bca84bf8424">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1713798322</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.746875</data>
83
+ <data key="e_suspicion_score">0.746875</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">bdeefa80-00b9-11ef-8b56-b9c5ad676a8a</data>
91
+ </edge>
92
+ <edge id="e3" source="HOST-12397" target="HOST-11397">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1713798322</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.746875</data>
97
+ <data key="e_suspicion_score">0.746875</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">bdeefa80-00b9-11ef-8b56-b9c5ad676a8a</data>
105
+ </edge>
106
+ <edge id="e4" source="HOST-11397" target="HOST-12397">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1713798322</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.746875</data>
111
+ <data key="e_suspicion_score">0.746875</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">bdeefa80-00b9-11ef-8b56-b9c5ad676a8a</data>
119
+ </edge>
120
+ <edge id="e5" source="896b2261-2a64-11ee-a681-7bc82f570d8b" target="HOST-11397">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1713798322</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.746875</data>
125
+ <data key="e_suspicion_score">0.746875</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">bdeefa80-00b9-11ef-8b56-b9c5ad676a8a</data>
133
+ </edge>
134
+ <edge id="e6" source="HOST-11397" target="896b2261-2a64-11ee-a681-7bc82f570d8b">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1713798322</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.746875</data>
139
+ <data key="e_suspicion_score">0.746875</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">bdeefa80-00b9-11ef-8b56-b9c5ad676a8a</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>
graph/incidents_graphml/b/bdf6e800-f613-11ed-a3d6-ad85d59eee66.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7867e660-bed5-11ed-93a9-8102b7634ad4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.48.65</data>
35
+ <data key="n_hostname">100.64.48.65</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall"]</data>
39
+ </node>
40
+ <node id="9405cae1-9d9c-11ed-8ca6-bfaecb56e6a3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.119</data>
43
+ <data key="n_hostname">100.64.71.119</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
47
+ </node>
48
+ <node id="38973341-f52d-11ed-b653-b754f0ae64ce">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.4.2</data>
51
+ <data key="n_hostname">100.64.4.2</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <edge id="e1" source="7867e660-bed5-11ed-93a9-8102b7634ad4" target="9405cae1-9d9c-11ed-8ca6-bfaecb56e6a3">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1684480017</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7890625</data>
61
+ <data key="e_suspicion_score">0.7890625</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">bdf6e800-f613-11ed-a3d6-ad85d59eee66</data>
69
+ </edge>
70
+ <edge id="e2" source="9405cae1-9d9c-11ed-8ca6-bfaecb56e6a3" target="7867e660-bed5-11ed-93a9-8102b7634ad4">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1684480017</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7890625</data>
75
+ <data key="e_suspicion_score">0.7890625</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">bdf6e800-f613-11ed-a3d6-ad85d59eee66</data>
83
+ </edge>
84
+ <edge id="e3" source="38973341-f52d-11ed-b653-b754f0ae64ce" target="9405cae1-9d9c-11ed-8ca6-bfaecb56e6a3">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1684480017</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.7890625</data>
89
+ <data key="e_suspicion_score">0.7890625</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">bdf6e800-f613-11ed-a3d6-ad85d59eee66</data>
97
+ </edge>
98
+ <edge id="e4" source="9405cae1-9d9c-11ed-8ca6-bfaecb56e6a3" target="38973341-f52d-11ed-b653-b754f0ae64ce">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1684480017</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.7890625</data>
103
+ <data key="e_suspicion_score">0.7890625</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">bdf6e800-f613-11ed-a3d6-ad85d59eee66</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/b/bdf9cc60-41fd-11ee-b97c-f959f41b9d07.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b0d69f82-1c24-11ee-8b27-872193f89e2b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.66.133</data>
43
+ <data key="n_hostname">100.64.66.133</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="HOST-11146">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692826856</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">bdf9cc60-41fd-11ee-b97c-f959f41b9d07</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdf9cc70-a070-11ee-8eba-81c30328b488.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3b7c4250-9f85-11ee-8a26-7bc049008564">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.53.157</data>
35
+ <data key="n_hostname">100.64.53.157</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.27.202.53</data>
43
+ <data key="n_hostname">172.27.202.53</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="3b7c4250-9f85-11ee-8a26-7bc049008564" target="HOST-2703">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703211657</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">bdf9cc70-a070-11ee-8eba-81c30328b488</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/bdfa2e80-6cba-11ed-88c8-935f200141c8.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="980b4180-f3fe-11ec-bbe1-cb24dabd5745">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.72.87</data>
35
+ <data key="n_hostname">100.64.72.87</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="feb32f13-0d3f-11ed-9446-617dd3e298e8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.1.49</data>
43
+ <data key="n_hostname">100.64.1.49</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="980b4180-f3fe-11ec-bbe1-cb24dabd5745" target="HOST-12684">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1669378482</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">bdfa2e80-6cba-11ed-88c8-935f200141c8</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-12684" target="980b4180-f3fe-11ec-bbe1-cb24dabd5745">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1669378482</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">bdfa2e80-6cba-11ed-88c8-935f200141c8</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/b/bdfa37b0-2d5b-11ee-9400-61c78ce5335d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.86.34</data>
35
+ <data key="n_hostname">172.23.86.34</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="41b00552-0627-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.19.51</data>
43
+ <data key="n_hostname">USER-0015-1418.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2717" target="HOST-9706">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690558255</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">bdfa37b0-2d5b-11ee-9400-61c78ce5335d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be02f970-cb8c-11ee-9d8c-014a3c92d0a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="79da4ec2-0629-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.29.4</data>
35
+ <data key="n_hostname">100.64.29.4</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.158.1</data>
43
+ <data key="n_hostname">172.29.158.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-5744" target="HOST-2858">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1707951583</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">be02f970-cb8c-11ee-9d8c-014a3c92d0a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be045ed0-3b73-11ef-b1e4-3da31b742190.graphml ADDED
@@ -0,0 +1,293 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="fb70a701-35ed-11ef-8858-354bbb7c2f05">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.21.239</data>
35
+ <data key="n_hostname">100.64.21.239</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="4fc6e1e1-28f4-11ef-a77c-efa856b3599e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.54.66</data>
43
+ <data key="n_hostname">172.24.54.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="7124ee10-28fc-11ef-8a9d-45659198471d">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.46.30</data>
51
+ <data key="n_hostname">100.64.46.30</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="46a4a734-3b6b-11ef-ab33-5b6e38c5444d">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.46.31</data>
59
+ <data key="n_hostname">100.64.46.31</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.7890625</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="57270144-28f4-11ef-b96f-c308e7969f10">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">172.26.73.92</data>
67
+ <data key="n_hostname">172.26.73.92</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.841796875</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="2c9952cb-2921-11ef-b6d7-63e68fa360c9">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.20.230</data>
75
+ <data key="n_hostname">100.64.20.230</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.7890625</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="d09eeeb0-28f5-11ef-9f0c-69e5e9251182">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.23.255</data>
83
+ <data key="n_hostname">100.64.23.255</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.578125</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="051486c2-15d6-11ee-ad6a-ddb6c172e543">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.46.32</data>
91
+ <data key="n_hostname">100.64.46.32</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.71875</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <edge id="e1" source="HOST-4733" target="HOST-5339">
97
+ <data key="e_type">INCIDENT_LINK</data>
98
+ <data key="e_timestamp">1720255376</data>
99
+ <data key="e_label_binary">malicious</data>
100
+ <data key="e_label_confidence">0.841796875</data>
101
+ <data key="e_suspicion_score">0.841796875</data>
102
+ <data key="e_mo_name">Data Theft</data>
103
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
104
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
105
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
106
+ <data key="e_lifecycle_stage">complete-mission</data>
107
+ <data key="e_disposition">Disrupted</data>
108
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
109
+ </edge>
110
+ <edge id="e2" source="HOST-5339" target="HOST-4733">
111
+ <data key="e_type">INCIDENT_LINK</data>
112
+ <data key="e_timestamp">1720255376</data>
113
+ <data key="e_label_binary">malicious</data>
114
+ <data key="e_label_confidence">0.841796875</data>
115
+ <data key="e_suspicion_score">0.841796875</data>
116
+ <data key="e_mo_name">Data Theft</data>
117
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
118
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
119
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
120
+ <data key="e_lifecycle_stage">complete-mission</data>
121
+ <data key="e_disposition">Disrupted</data>
122
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
123
+ </edge>
124
+ <edge id="e3" source="HOST-5339" target="7124ee10-28fc-11ef-8a9d-45659198471d">
125
+ <data key="e_type">INCIDENT_LINK</data>
126
+ <data key="e_timestamp">1720255376</data>
127
+ <data key="e_label_binary">malicious</data>
128
+ <data key="e_label_confidence">0.841796875</data>
129
+ <data key="e_suspicion_score">0.841796875</data>
130
+ <data key="e_mo_name">Data Theft</data>
131
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
132
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
133
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
134
+ <data key="e_lifecycle_stage">complete-mission</data>
135
+ <data key="e_disposition">Disrupted</data>
136
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
137
+ </edge>
138
+ <edge id="e4" source="7124ee10-28fc-11ef-8a9d-45659198471d" target="HOST-5339">
139
+ <data key="e_type">INCIDENT_LINK</data>
140
+ <data key="e_timestamp">1720255376</data>
141
+ <data key="e_label_binary">malicious</data>
142
+ <data key="e_label_confidence">0.841796875</data>
143
+ <data key="e_suspicion_score">0.841796875</data>
144
+ <data key="e_mo_name">Data Theft</data>
145
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
146
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
147
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
148
+ <data key="e_lifecycle_stage">complete-mission</data>
149
+ <data key="e_disposition">Disrupted</data>
150
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
151
+ </edge>
152
+ <edge id="e5" source="46a4a734-3b6b-11ef-ab33-5b6e38c5444d" target="HOST-5339">
153
+ <data key="e_type">INCIDENT_LINK</data>
154
+ <data key="e_timestamp">1720255376</data>
155
+ <data key="e_label_binary">malicious</data>
156
+ <data key="e_label_confidence">0.841796875</data>
157
+ <data key="e_suspicion_score">0.841796875</data>
158
+ <data key="e_mo_name">Data Theft</data>
159
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
160
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
161
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
162
+ <data key="e_lifecycle_stage">complete-mission</data>
163
+ <data key="e_disposition">Disrupted</data>
164
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
165
+ </edge>
166
+ <edge id="e6" source="HOST-5339" target="46a4a734-3b6b-11ef-ab33-5b6e38c5444d">
167
+ <data key="e_type">INCIDENT_LINK</data>
168
+ <data key="e_timestamp">1720255376</data>
169
+ <data key="e_label_binary">malicious</data>
170
+ <data key="e_label_confidence">0.841796875</data>
171
+ <data key="e_suspicion_score">0.841796875</data>
172
+ <data key="e_mo_name">Data Theft</data>
173
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
174
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
175
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
176
+ <data key="e_lifecycle_stage">complete-mission</data>
177
+ <data key="e_disposition">Disrupted</data>
178
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
179
+ </edge>
180
+ <edge id="e7" source="46a4a734-3b6b-11ef-ab33-5b6e38c5444d" target="HOST-4725">
181
+ <data key="e_type">INCIDENT_LINK</data>
182
+ <data key="e_timestamp">1720255376</data>
183
+ <data key="e_label_binary">malicious</data>
184
+ <data key="e_label_confidence">0.841796875</data>
185
+ <data key="e_suspicion_score">0.841796875</data>
186
+ <data key="e_mo_name">Data Theft</data>
187
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
188
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
189
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
190
+ <data key="e_lifecycle_stage">complete-mission</data>
191
+ <data key="e_disposition">Disrupted</data>
192
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
193
+ </edge>
194
+ <edge id="e8" source="HOST-4725" target="46a4a734-3b6b-11ef-ab33-5b6e38c5444d">
195
+ <data key="e_type">INCIDENT_LINK</data>
196
+ <data key="e_timestamp">1720255376</data>
197
+ <data key="e_label_binary">malicious</data>
198
+ <data key="e_label_confidence">0.841796875</data>
199
+ <data key="e_suspicion_score">0.841796875</data>
200
+ <data key="e_mo_name">Data Theft</data>
201
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
202
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
203
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
204
+ <data key="e_lifecycle_stage">complete-mission</data>
205
+ <data key="e_disposition">Disrupted</data>
206
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
207
+ </edge>
208
+ <edge id="e9" source="HOST-4725" target="2c9952cb-2921-11ef-b6d7-63e68fa360c9">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1720255376</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.841796875</data>
213
+ <data key="e_suspicion_score">0.841796875</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Disrupted</data>
220
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
221
+ </edge>
222
+ <edge id="e10" source="2c9952cb-2921-11ef-b6d7-63e68fa360c9" target="HOST-4725">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1720255376</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.841796875</data>
227
+ <data key="e_suspicion_score">0.841796875</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Disrupted</data>
234
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
235
+ </edge>
236
+ <edge id="e11" source="d09eeeb0-28f5-11ef-9f0c-69e5e9251182" target="HOST-4725">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1720255376</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.841796875</data>
241
+ <data key="e_suspicion_score">0.841796875</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Disrupted</data>
248
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
249
+ </edge>
250
+ <edge id="e12" source="HOST-4725" target="d09eeeb0-28f5-11ef-9f0c-69e5e9251182">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1720255376</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.841796875</data>
255
+ <data key="e_suspicion_score">0.841796875</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Disrupted</data>
262
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
263
+ </edge>
264
+ <edge id="e13" source="051486c2-15d6-11ee-ad6a-ddb6c172e543" target="HOST-4725">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1720255376</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.841796875</data>
269
+ <data key="e_suspicion_score">0.841796875</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Disrupted</data>
276
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
277
+ </edge>
278
+ <edge id="e14" source="HOST-4725" target="051486c2-15d6-11ee-ad6a-ddb6c172e543">
279
+ <data key="e_type">INCIDENT_LINK</data>
280
+ <data key="e_timestamp">1720255376</data>
281
+ <data key="e_label_binary">malicious</data>
282
+ <data key="e_label_confidence">0.841796875</data>
283
+ <data key="e_suspicion_score">0.841796875</data>
284
+ <data key="e_mo_name">Data Theft</data>
285
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
286
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
287
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
288
+ <data key="e_lifecycle_stage">complete-mission</data>
289
+ <data key="e_disposition">Disrupted</data>
290
+ <data key="e_incident_id">be045ed0-3b73-11ef-b1e4-3da31b742190</data>
291
+ </edge>
292
+ </graph>
293
+ </graphml>
graph/incidents_graphml/b/be074240-3d0d-11ee-ba1f-812391e2855d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.168.48</data>
35
+ <data key="n_hostname">172.30.168.48</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="bfe7c193-0624-11ee-8860-f951c26910c1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.66.32</data>
43
+ <data key="n_hostname">100.64.66.32</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2842" target="HOST-11093">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692283973</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be074240-3d0d-11ee-ba1f-812391e2855d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be083320-f9fb-11ee-a91e-b385ff48b568.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.26.23.117</data>
35
+ <data key="n_hostname">172.26.23.117</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c06b9790-0624-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.9.126</data>
43
+ <data key="n_hostname">100.64.9.126</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.9746875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Stealthwatch"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2824" target="HOST-3041">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713057011</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.9746875</data>
53
+ <data key="e_suspicion_score">0.9746875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be083320-f9fb-11ee-a91e-b385ff48b568</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.158.1</data>
35
+ <data key="n_hostname">172.29.158.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="79da4ec2-0629-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.29.4</data>
43
+ <data key="n_hostname">100.64.29.4</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.87625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2858" target="HOST-5744">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1707951584</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.87625</data>
53
+ <data key="e_suspicion_score">0.87625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be10b0b0-4a09-11ee-8bf8-c1f4992fd587.graphml ADDED
@@ -0,0 +1,359 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="583b8ce6-4808-11ee-8c3e-5dfeed3094c9">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.33.67</data>
35
+ <data key="n_hostname">100.64.33.67</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.6.172</data>
43
+ <data key="n_hostname">172.31.6.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="84fe64e0-0632-11ee-b093-7915be767a62">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.17.189</data>
51
+ <data key="n_hostname">100.64.17.189</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.29.40.149</data>
59
+ <data key="n_hostname">172.29.40.149</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="dea2ffc4-0997-11ee-a4e2-e3a85dae7a6d">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.33.68</data>
67
+ <data key="n_hostname">100.64.33.68</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="b6040490-0624-11ee-b19f-ed665a42340f">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.32.190</data>
75
+ <data key="n_hostname">100.64.32.190</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="70f7fb20-0969-11ee-84aa-6fd5d05369c0">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.33.69</data>
83
+ <data key="n_hostname">100.64.33.69</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="30cd25f0-062d-11ee-96ff-759d178f6b48">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.33.70</data>
91
+ <data key="n_hostname">100.64.33.70</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="89cbd2d1-062f-11ee-bac6-d555be81cc5e">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.33.71</data>
99
+ <data key="n_hostname">HOST-6312</data>
100
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="db226370-49e0-11ee-b12e-f39f6307c380">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.33.72</data>
107
+ <data key="n_hostname">100.64.33.72</data>
108
+ <data key="n_set_roles">["Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.25</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="012de2d4-0795-11ee-a943-b5557ada4b44">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.17.176</data>
115
+ <data key="n_hostname">100.64.17.176</data>
116
+ <data key="n_set_roles">["Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.25</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <edge id="e1" source="583b8ce6-4808-11ee-8c3e-5dfeed3094c9" target="HOST-2757">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1693711619</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.7</data>
125
+ <data key="e_suspicion_score">0.25</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Unprocessed</data>
132
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
133
+ </edge>
134
+ <edge id="e2" source="HOST-2757" target="583b8ce6-4808-11ee-8c3e-5dfeed3094c9">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1693711619</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.7</data>
139
+ <data key="e_suspicion_score">0.25</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Unprocessed</data>
146
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
147
+ </edge>
148
+ <edge id="e3" source="HOST-4169" target="HOST-2834">
149
+ <data key="e_type">INCIDENT_LINK</data>
150
+ <data key="e_timestamp">1693711619</data>
151
+ <data key="e_label_binary">malicious</data>
152
+ <data key="e_label_confidence">0.7</data>
153
+ <data key="e_suspicion_score">0.25</data>
154
+ <data key="e_mo_name">Data Theft</data>
155
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
156
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
157
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
158
+ <data key="e_lifecycle_stage">complete-mission</data>
159
+ <data key="e_disposition">Unprocessed</data>
160
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
161
+ </edge>
162
+ <edge id="e4" source="HOST-2834" target="HOST-4169">
163
+ <data key="e_type">INCIDENT_LINK</data>
164
+ <data key="e_timestamp">1693711619</data>
165
+ <data key="e_label_binary">malicious</data>
166
+ <data key="e_label_confidence">0.7</data>
167
+ <data key="e_suspicion_score">0.25</data>
168
+ <data key="e_mo_name">Data Theft</data>
169
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
170
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
171
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
172
+ <data key="e_lifecycle_stage">complete-mission</data>
173
+ <data key="e_disposition">Unprocessed</data>
174
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
175
+ </edge>
176
+ <edge id="e5" source="dea2ffc4-0997-11ee-a4e2-e3a85dae7a6d" target="HOST-2834">
177
+ <data key="e_type">INCIDENT_LINK</data>
178
+ <data key="e_timestamp">1693711619</data>
179
+ <data key="e_label_binary">malicious</data>
180
+ <data key="e_label_confidence">0.7</data>
181
+ <data key="e_suspicion_score">0.25</data>
182
+ <data key="e_mo_name">Data Theft</data>
183
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
184
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
185
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
186
+ <data key="e_lifecycle_stage">complete-mission</data>
187
+ <data key="e_disposition">Unprocessed</data>
188
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
189
+ </edge>
190
+ <edge id="e6" source="HOST-2834" target="dea2ffc4-0997-11ee-a4e2-e3a85dae7a6d">
191
+ <data key="e_type">INCIDENT_LINK</data>
192
+ <data key="e_timestamp">1693711619</data>
193
+ <data key="e_label_binary">malicious</data>
194
+ <data key="e_label_confidence">0.7</data>
195
+ <data key="e_suspicion_score">0.25</data>
196
+ <data key="e_mo_name">Data Theft</data>
197
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
198
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
199
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
200
+ <data key="e_lifecycle_stage">complete-mission</data>
201
+ <data key="e_disposition">Unprocessed</data>
202
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
203
+ </edge>
204
+ <edge id="e7" source="HOST-6248" target="HOST-2834">
205
+ <data key="e_type">INCIDENT_LINK</data>
206
+ <data key="e_timestamp">1693711619</data>
207
+ <data key="e_label_binary">malicious</data>
208
+ <data key="e_label_confidence">0.7</data>
209
+ <data key="e_suspicion_score">0.25</data>
210
+ <data key="e_mo_name">Data Theft</data>
211
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
212
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
213
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
214
+ <data key="e_lifecycle_stage">complete-mission</data>
215
+ <data key="e_disposition">Unprocessed</data>
216
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
217
+ </edge>
218
+ <edge id="e8" source="HOST-2834" target="HOST-6248">
219
+ <data key="e_type">INCIDENT_LINK</data>
220
+ <data key="e_timestamp">1693711619</data>
221
+ <data key="e_label_binary">malicious</data>
222
+ <data key="e_label_confidence">0.7</data>
223
+ <data key="e_suspicion_score">0.25</data>
224
+ <data key="e_mo_name">Data Theft</data>
225
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
226
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
227
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
228
+ <data key="e_lifecycle_stage">complete-mission</data>
229
+ <data key="e_disposition">Unprocessed</data>
230
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
231
+ </edge>
232
+ <edge id="e9" source="70f7fb20-0969-11ee-84aa-6fd5d05369c0" target="HOST-2834">
233
+ <data key="e_type">INCIDENT_LINK</data>
234
+ <data key="e_timestamp">1693711619</data>
235
+ <data key="e_label_binary">malicious</data>
236
+ <data key="e_label_confidence">0.7</data>
237
+ <data key="e_suspicion_score">0.25</data>
238
+ <data key="e_mo_name">Data Theft</data>
239
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
240
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
241
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
242
+ <data key="e_lifecycle_stage">complete-mission</data>
243
+ <data key="e_disposition">Unprocessed</data>
244
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
245
+ </edge>
246
+ <edge id="e10" source="HOST-2834" target="70f7fb20-0969-11ee-84aa-6fd5d05369c0">
247
+ <data key="e_type">INCIDENT_LINK</data>
248
+ <data key="e_timestamp">1693711619</data>
249
+ <data key="e_label_binary">malicious</data>
250
+ <data key="e_label_confidence">0.7</data>
251
+ <data key="e_suspicion_score">0.25</data>
252
+ <data key="e_mo_name">Data Theft</data>
253
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
254
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
255
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
256
+ <data key="e_lifecycle_stage">complete-mission</data>
257
+ <data key="e_disposition">Unprocessed</data>
258
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
259
+ </edge>
260
+ <edge id="e11" source="30cd25f0-062d-11ee-96ff-759d178f6b48" target="HOST-2834">
261
+ <data key="e_type">INCIDENT_LINK</data>
262
+ <data key="e_timestamp">1693711619</data>
263
+ <data key="e_label_binary">malicious</data>
264
+ <data key="e_label_confidence">0.7</data>
265
+ <data key="e_suspicion_score">0.25</data>
266
+ <data key="e_mo_name">Data Theft</data>
267
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
268
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
269
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
270
+ <data key="e_lifecycle_stage">complete-mission</data>
271
+ <data key="e_disposition">Unprocessed</data>
272
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
273
+ </edge>
274
+ <edge id="e12" source="HOST-2834" target="30cd25f0-062d-11ee-96ff-759d178f6b48">
275
+ <data key="e_type">INCIDENT_LINK</data>
276
+ <data key="e_timestamp">1693711619</data>
277
+ <data key="e_label_binary">malicious</data>
278
+ <data key="e_label_confidence">0.7</data>
279
+ <data key="e_suspicion_score">0.25</data>
280
+ <data key="e_mo_name">Data Theft</data>
281
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
282
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
283
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
284
+ <data key="e_lifecycle_stage">complete-mission</data>
285
+ <data key="e_disposition">Unprocessed</data>
286
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
287
+ </edge>
288
+ <edge id="e13" source="89cbd2d1-062f-11ee-bac6-d555be81cc5e" target="HOST-2834">
289
+ <data key="e_type">INCIDENT_LINK</data>
290
+ <data key="e_timestamp">1693711619</data>
291
+ <data key="e_label_binary">malicious</data>
292
+ <data key="e_label_confidence">0.7</data>
293
+ <data key="e_suspicion_score">0.25</data>
294
+ <data key="e_mo_name">Data Theft</data>
295
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
296
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
297
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
298
+ <data key="e_lifecycle_stage">complete-mission</data>
299
+ <data key="e_disposition">Unprocessed</data>
300
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
301
+ </edge>
302
+ <edge id="e14" source="HOST-2834" target="89cbd2d1-062f-11ee-bac6-d555be81cc5e">
303
+ <data key="e_type">INCIDENT_LINK</data>
304
+ <data key="e_timestamp">1693711619</data>
305
+ <data key="e_label_binary">malicious</data>
306
+ <data key="e_label_confidence">0.7</data>
307
+ <data key="e_suspicion_score">0.25</data>
308
+ <data key="e_mo_name">Data Theft</data>
309
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
310
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
311
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
312
+ <data key="e_lifecycle_stage">complete-mission</data>
313
+ <data key="e_disposition">Unprocessed</data>
314
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
315
+ </edge>
316
+ <edge id="e15" source="db226370-49e0-11ee-b12e-f39f6307c380" target="HOST-2834">
317
+ <data key="e_type">INCIDENT_LINK</data>
318
+ <data key="e_timestamp">1693711619</data>
319
+ <data key="e_label_binary">malicious</data>
320
+ <data key="e_label_confidence">0.7</data>
321
+ <data key="e_suspicion_score">0.25</data>
322
+ <data key="e_mo_name">Data Theft</data>
323
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
324
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
325
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
326
+ <data key="e_lifecycle_stage">complete-mission</data>
327
+ <data key="e_disposition">Unprocessed</data>
328
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
329
+ </edge>
330
+ <edge id="e16" source="HOST-2834" target="db226370-49e0-11ee-b12e-f39f6307c380">
331
+ <data key="e_type">INCIDENT_LINK</data>
332
+ <data key="e_timestamp">1693711619</data>
333
+ <data key="e_label_binary">malicious</data>
334
+ <data key="e_label_confidence">0.7</data>
335
+ <data key="e_suspicion_score">0.25</data>
336
+ <data key="e_mo_name">Data Theft</data>
337
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
338
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
339
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
340
+ <data key="e_lifecycle_stage">complete-mission</data>
341
+ <data key="e_disposition">Unprocessed</data>
342
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
343
+ </edge>
344
+ <edge id="e17" source="HOST-2834" target="HOST-4156">
345
+ <data key="e_type">INCIDENT_LINK</data>
346
+ <data key="e_timestamp">1693711619</data>
347
+ <data key="e_label_binary">malicious</data>
348
+ <data key="e_label_confidence">0.7</data>
349
+ <data key="e_suspicion_score">0.25</data>
350
+ <data key="e_mo_name">Data Theft</data>
351
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
352
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
353
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
354
+ <data key="e_lifecycle_stage">complete-mission</data>
355
+ <data key="e_disposition">Unprocessed</data>
356
+ <data key="e_incident_id">be10b0b0-4a09-11ee-8bf8-c1f4992fd587</data>
357
+ </edge>
358
+ </graph>
359
+ </graphml>
graph/incidents_graphml/b/be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="457bcfd0-0626-11ee-8794-6bae0a4a6dd8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.10.46</data>
43
+ <data key="n_hostname">100.64.10.46</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2748" target="HOST-3134">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1707951584</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be226350-3e29-11ee-b681-89e3497f1d7e.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0f283041-0626-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.9.100</data>
35
+ <data key="n_hostname">100.64.9.100</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.54.66</data>
43
+ <data key="n_hostname">172.24.54.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3030" target="HOST-2745">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692405950</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">be226350-3e29-11ee-b681-89e3497f1d7e</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be256290-1c3c-11ed-9dc4-eb234c0496d2.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="73796f12-1a99-11ed-9639-939204310763">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.78.37</data>
35
+ <data key="n_hostname">100.64.78.37</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="dd611f50-ea91-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.73.89</data>
43
+ <data key="n_hostname">100.64.73.89</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="73796f12-1a99-11ed-9639-939204310763" target="dd611f50-ea91-11ec-abf7-619673fe2558">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660528273</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be256290-1c3c-11ed-9dc4-eb234c0496d2</data>
61
+ </edge>
62
+ <edge id="e2" source="dd611f50-ea91-11ec-abf7-619673fe2558" target="73796f12-1a99-11ed-9639-939204310763">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1660528273</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">be256290-1c3c-11ed-9dc4-eb234c0496d2</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/b/be289e00-cf6a-11ee-91bc-e1cf8103bf6f.graphml ADDED
@@ -0,0 +1,783 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0fa593f0-07a2-11ee-aa3c-e5312f4bba5e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.19.152</data>
35
+ <data key="n_hostname">100.64.19.152</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.6.172</data>
43
+ <data key="n_hostname">172.31.6.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="ae8760b3-4cea-11ee-a3f3-dba7e831f298">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.52.104</data>
51
+ <data key="n_hostname">100.64.52.104</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.18.38.152</data>
59
+ <data key="n_hostname">172.18.38.152</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="4ead2ef4-0635-11ee-877a-6de6b73825b2">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.2.126</data>
67
+ <data key="n_hostname">100.64.2.126</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="991ba233-0641-11ee-a20a-9dfc2a4122e6">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.39.29</data>
75
+ <data key="n_hostname">100.64.39.29</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="27e0f133-5301-11ee-84a4-ffb01ff8a4c1">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.26.178</data>
83
+ <data key="n_hostname">100.64.26.178</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="b34e8181-0624-11ee-94f6-0d301f382bbb">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.3.254</data>
91
+ <data key="n_hostname">100.64.3.254</data>
92
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="da6b9554-062e-11ee-9e70-7d7711d897d8">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">172.31.11.166</data>
99
+ <data key="n_hostname">172.31.11.166</data>
100
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="81b7ff62-0625-11ee-87d2-5909d78e9e20">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.16.118</data>
107
+ <data key="n_hostname">100.64.16.118</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.25</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="b81514d6-0625-11ee-8860-f951c26910c1">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.5.188</data>
115
+ <data key="n_hostname">100.64.5.188</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.25</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="dbbef9e1-c719-11ee-8d6e-11118477b4e1">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.52.105</data>
123
+ <data key="n_hostname">100.64.52.105</data>
124
+ <data key="n_set_roles">["Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.25</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="ba7ab840-0627-11ee-ad3e-fda0da874cab">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.9.252</data>
131
+ <data key="n_hostname">100.64.9.252</data>
132
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
133
+ <data key="n_suspicion_score">0.25</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="fb871871-98ed-11ee-bd7a-6d2409f4df1b">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.8.108</data>
139
+ <data key="n_hostname">100.64.8.108</data>
140
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
141
+ <data key="n_suspicion_score">0.25</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <node id="e64d3aa0-062d-11ee-a11e-275c53a8bf04">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.8.120</data>
147
+ <data key="n_hostname">100.64.8.120</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.25</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <node id="e94aea30-502f-11ee-bf8a-7905ff4a6380">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.52.106</data>
155
+ <data key="n_hostname">100.64.52.106</data>
156
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
157
+ <data key="n_suspicion_score">0.25</data>
158
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
159
+ </node>
160
+ <node id="c0a5a3a1-0b64-11ee-995c-e342b8165854">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.14.22</data>
163
+ <data key="n_hostname">100.64.14.22</data>
164
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
165
+ <data key="n_suspicion_score">0.25</data>
166
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
167
+ </node>
168
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">172.16.233.43</data>
171
+ <data key="n_hostname">172.16.233.43</data>
172
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
173
+ <data key="n_suspicion_score">0.25</data>
174
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
175
+ </node>
176
+ <node id="caed0312-0643-11ee-ab31-d9cf07186757">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">100.64.52.107</data>
179
+ <data key="n_hostname">100.64.52.107</data>
180
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
181
+ <data key="n_suspicion_score">0.25</data>
182
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
183
+ </node>
184
+ <node id="602621e1-0631-11ee-91b8-1b33bc4789da">
185
+ <data key="n_type">HOST</data>
186
+ <data key="n_ip">100.64.7.34</data>
187
+ <data key="n_hostname">100.64.7.34</data>
188
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
189
+ <data key="n_suspicion_score">0.25</data>
190
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
191
+ </node>
192
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
193
+ <data key="n_type">HOST</data>
194
+ <data key="n_ip">172.29.158.1</data>
195
+ <data key="n_hostname">172.29.158.1</data>
196
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
197
+ <data key="n_suspicion_score">0.25</data>
198
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
199
+ </node>
200
+ <node id="2cae6302-063a-11ee-9818-93ee35bf586a">
201
+ <data key="n_type">HOST</data>
202
+ <data key="n_ip">100.64.18.130</data>
203
+ <data key="n_hostname">100.64.18.130</data>
204
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
205
+ <data key="n_suspicion_score">0.25</data>
206
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
207
+ </node>
208
+ <edge id="e1" source="HOST-4413" target="HOST-2757">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1708376785</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.7</data>
213
+ <data key="e_suspicion_score">0.25</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Unprocessed</data>
220
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
221
+ </edge>
222
+ <edge id="e2" source="HOST-2757" target="HOST-4413">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1708376785</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.7</data>
227
+ <data key="e_suspicion_score">0.25</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Unprocessed</data>
234
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
235
+ </edge>
236
+ <edge id="e3" source="ae8760b3-4cea-11ee-a3f3-dba7e831f298" target="HOST-2844">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1708376785</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.7</data>
241
+ <data key="e_suspicion_score">0.25</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Unprocessed</data>
248
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
249
+ </edge>
250
+ <edge id="e4" source="HOST-2844" target="ae8760b3-4cea-11ee-a3f3-dba7e831f298">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1708376785</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.7</data>
255
+ <data key="e_suspicion_score">0.25</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Unprocessed</data>
262
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
263
+ </edge>
264
+ <edge id="e5" source="HOST-4413" target="HOST-2844">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1708376785</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.7</data>
269
+ <data key="e_suspicion_score">0.25</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Unprocessed</data>
276
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
277
+ </edge>
278
+ <edge id="e6" source="HOST-2844" target="HOST-4413">
279
+ <data key="e_type">INCIDENT_LINK</data>
280
+ <data key="e_timestamp">1708376785</data>
281
+ <data key="e_label_binary">malicious</data>
282
+ <data key="e_label_confidence">0.7</data>
283
+ <data key="e_suspicion_score">0.25</data>
284
+ <data key="e_mo_name">Data Theft</data>
285
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
286
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
287
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
288
+ <data key="e_lifecycle_stage">complete-mission</data>
289
+ <data key="e_disposition">Unprocessed</data>
290
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
291
+ </edge>
292
+ <edge id="e7" source="HOST-8249" target="HOST-2757">
293
+ <data key="e_type">INCIDENT_LINK</data>
294
+ <data key="e_timestamp">1708376785</data>
295
+ <data key="e_label_binary">malicious</data>
296
+ <data key="e_label_confidence">0.7</data>
297
+ <data key="e_suspicion_score">0.25</data>
298
+ <data key="e_mo_name">Data Theft</data>
299
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
300
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
301
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
302
+ <data key="e_lifecycle_stage">complete-mission</data>
303
+ <data key="e_disposition">Unprocessed</data>
304
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
305
+ </edge>
306
+ <edge id="e8" source="HOST-2757" target="HOST-8249">
307
+ <data key="e_type">INCIDENT_LINK</data>
308
+ <data key="e_timestamp">1708376785</data>
309
+ <data key="e_label_binary">malicious</data>
310
+ <data key="e_label_confidence">0.7</data>
311
+ <data key="e_suspicion_score">0.25</data>
312
+ <data key="e_mo_name">Data Theft</data>
313
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
314
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
315
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
316
+ <data key="e_lifecycle_stage">complete-mission</data>
317
+ <data key="e_disposition">Unprocessed</data>
318
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
319
+ </edge>
320
+ <edge id="e9" source="HOST-7081" target="HOST-2844">
321
+ <data key="e_type">INCIDENT_LINK</data>
322
+ <data key="e_timestamp">1708376785</data>
323
+ <data key="e_label_binary">malicious</data>
324
+ <data key="e_label_confidence">0.7</data>
325
+ <data key="e_suspicion_score">0.25</data>
326
+ <data key="e_mo_name">Data Theft</data>
327
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
328
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
329
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
330
+ <data key="e_lifecycle_stage">complete-mission</data>
331
+ <data key="e_disposition">Unprocessed</data>
332
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
333
+ </edge>
334
+ <edge id="e10" source="HOST-2844" target="HOST-7081">
335
+ <data key="e_type">INCIDENT_LINK</data>
336
+ <data key="e_timestamp">1708376785</data>
337
+ <data key="e_label_binary">malicious</data>
338
+ <data key="e_label_confidence">0.7</data>
339
+ <data key="e_suspicion_score">0.25</data>
340
+ <data key="e_mo_name">Data Theft</data>
341
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
342
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
343
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
344
+ <data key="e_lifecycle_stage">complete-mission</data>
345
+ <data key="e_disposition">Unprocessed</data>
346
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
347
+ </edge>
348
+ <edge id="e11" source="HOST-5404" target="HOST-2757">
349
+ <data key="e_type">INCIDENT_LINK</data>
350
+ <data key="e_timestamp">1708376785</data>
351
+ <data key="e_label_binary">malicious</data>
352
+ <data key="e_label_confidence">0.7</data>
353
+ <data key="e_suspicion_score">0.25</data>
354
+ <data key="e_mo_name">Data Theft</data>
355
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
356
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
357
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
358
+ <data key="e_lifecycle_stage">complete-mission</data>
359
+ <data key="e_disposition">Unprocessed</data>
360
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
361
+ </edge>
362
+ <edge id="e12" source="HOST-2757" target="HOST-5404">
363
+ <data key="e_type">INCIDENT_LINK</data>
364
+ <data key="e_timestamp">1708376785</data>
365
+ <data key="e_label_binary">malicious</data>
366
+ <data key="e_label_confidence">0.7</data>
367
+ <data key="e_suspicion_score">0.25</data>
368
+ <data key="e_mo_name">Data Theft</data>
369
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
370
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
371
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
372
+ <data key="e_lifecycle_stage">complete-mission</data>
373
+ <data key="e_disposition">Unprocessed</data>
374
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
375
+ </edge>
376
+ <edge id="e13" source="HOST-2948" target="HOST-2711">
377
+ <data key="e_type">INCIDENT_LINK</data>
378
+ <data key="e_timestamp">1708376785</data>
379
+ <data key="e_label_binary">malicious</data>
380
+ <data key="e_label_confidence">0.7</data>
381
+ <data key="e_suspicion_score">0.25</data>
382
+ <data key="e_mo_name">Data Theft</data>
383
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
384
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
385
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
386
+ <data key="e_lifecycle_stage">complete-mission</data>
387
+ <data key="e_disposition">Unprocessed</data>
388
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
389
+ </edge>
390
+ <edge id="e14" source="HOST-2711" target="HOST-2948">
391
+ <data key="e_type">INCIDENT_LINK</data>
392
+ <data key="e_timestamp">1708376785</data>
393
+ <data key="e_label_binary">malicious</data>
394
+ <data key="e_label_confidence">0.7</data>
395
+ <data key="e_suspicion_score">0.25</data>
396
+ <data key="e_mo_name">Data Theft</data>
397
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
398
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
399
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
400
+ <data key="e_lifecycle_stage">complete-mission</data>
401
+ <data key="e_disposition">Unprocessed</data>
402
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
403
+ </edge>
404
+ <edge id="e15" source="HOST-3993" target="HOST-2711">
405
+ <data key="e_type">INCIDENT_LINK</data>
406
+ <data key="e_timestamp">1708376785</data>
407
+ <data key="e_label_binary">malicious</data>
408
+ <data key="e_label_confidence">0.7</data>
409
+ <data key="e_suspicion_score">0.25</data>
410
+ <data key="e_mo_name">Data Theft</data>
411
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
412
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
413
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
414
+ <data key="e_lifecycle_stage">complete-mission</data>
415
+ <data key="e_disposition">Unprocessed</data>
416
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
417
+ </edge>
418
+ <edge id="e16" source="HOST-2711" target="HOST-3993">
419
+ <data key="e_type">INCIDENT_LINK</data>
420
+ <data key="e_timestamp">1708376785</data>
421
+ <data key="e_label_binary">malicious</data>
422
+ <data key="e_label_confidence">0.7</data>
423
+ <data key="e_suspicion_score">0.25</data>
424
+ <data key="e_mo_name">Data Theft</data>
425
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
426
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
427
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
428
+ <data key="e_lifecycle_stage">complete-mission</data>
429
+ <data key="e_disposition">Unprocessed</data>
430
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
431
+ </edge>
432
+ <edge id="e17" source="HOST-3525" target="HOST-2711">
433
+ <data key="e_type">INCIDENT_LINK</data>
434
+ <data key="e_timestamp">1708376785</data>
435
+ <data key="e_label_binary">malicious</data>
436
+ <data key="e_label_confidence">0.7</data>
437
+ <data key="e_suspicion_score">0.25</data>
438
+ <data key="e_mo_name">Data Theft</data>
439
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
440
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
441
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
442
+ <data key="e_lifecycle_stage">complete-mission</data>
443
+ <data key="e_disposition">Unprocessed</data>
444
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
445
+ </edge>
446
+ <edge id="e18" source="HOST-2711" target="HOST-3525">
447
+ <data key="e_type">INCIDENT_LINK</data>
448
+ <data key="e_timestamp">1708376785</data>
449
+ <data key="e_label_binary">malicious</data>
450
+ <data key="e_label_confidence">0.7</data>
451
+ <data key="e_suspicion_score">0.25</data>
452
+ <data key="e_mo_name">Data Theft</data>
453
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
454
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
455
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
456
+ <data key="e_lifecycle_stage">complete-mission</data>
457
+ <data key="e_disposition">Unprocessed</data>
458
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
459
+ </edge>
460
+ <edge id="e19" source="dbbef9e1-c719-11ee-8d6e-11118477b4e1" target="HOST-2711">
461
+ <data key="e_type">INCIDENT_LINK</data>
462
+ <data key="e_timestamp">1708376785</data>
463
+ <data key="e_label_binary">malicious</data>
464
+ <data key="e_label_confidence">0.7</data>
465
+ <data key="e_suspicion_score">0.25</data>
466
+ <data key="e_mo_name">Data Theft</data>
467
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
468
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
469
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
470
+ <data key="e_lifecycle_stage">complete-mission</data>
471
+ <data key="e_disposition">Unprocessed</data>
472
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
473
+ </edge>
474
+ <edge id="e20" source="HOST-2711" target="dbbef9e1-c719-11ee-8d6e-11118477b4e1">
475
+ <data key="e_type">INCIDENT_LINK</data>
476
+ <data key="e_timestamp">1708376785</data>
477
+ <data key="e_label_binary">malicious</data>
478
+ <data key="e_label_confidence">0.7</data>
479
+ <data key="e_suspicion_score">0.25</data>
480
+ <data key="e_mo_name">Data Theft</data>
481
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
482
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
483
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
484
+ <data key="e_lifecycle_stage">complete-mission</data>
485
+ <data key="e_disposition">Unprocessed</data>
486
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
487
+ </edge>
488
+ <edge id="e21" source="HOST-3101" target="HOST-2711">
489
+ <data key="e_type">INCIDENT_LINK</data>
490
+ <data key="e_timestamp">1708376785</data>
491
+ <data key="e_label_binary">malicious</data>
492
+ <data key="e_label_confidence">0.7</data>
493
+ <data key="e_suspicion_score">0.25</data>
494
+ <data key="e_mo_name">Data Theft</data>
495
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
496
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
497
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
498
+ <data key="e_lifecycle_stage">complete-mission</data>
499
+ <data key="e_disposition">Unprocessed</data>
500
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
501
+ </edge>
502
+ <edge id="e22" source="HOST-2711" target="HOST-3101">
503
+ <data key="e_type">INCIDENT_LINK</data>
504
+ <data key="e_timestamp">1708376785</data>
505
+ <data key="e_label_binary">malicious</data>
506
+ <data key="e_label_confidence">0.7</data>
507
+ <data key="e_suspicion_score">0.25</data>
508
+ <data key="e_mo_name">Data Theft</data>
509
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
510
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
511
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
512
+ <data key="e_lifecycle_stage">complete-mission</data>
513
+ <data key="e_disposition">Unprocessed</data>
514
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
515
+ </edge>
516
+ <edge id="e23" source="ae8760b3-4cea-11ee-a3f3-dba7e831f298" target="HOST-2711">
517
+ <data key="e_type">INCIDENT_LINK</data>
518
+ <data key="e_timestamp">1708376785</data>
519
+ <data key="e_label_binary">malicious</data>
520
+ <data key="e_label_confidence">0.7</data>
521
+ <data key="e_suspicion_score">0.25</data>
522
+ <data key="e_mo_name">Data Theft</data>
523
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
524
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
525
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
526
+ <data key="e_lifecycle_stage">complete-mission</data>
527
+ <data key="e_disposition">Unprocessed</data>
528
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
529
+ </edge>
530
+ <edge id="e24" source="HOST-2711" target="ae8760b3-4cea-11ee-a3f3-dba7e831f298">
531
+ <data key="e_type">INCIDENT_LINK</data>
532
+ <data key="e_timestamp">1708376785</data>
533
+ <data key="e_label_binary">malicious</data>
534
+ <data key="e_label_confidence">0.7</data>
535
+ <data key="e_suspicion_score">0.25</data>
536
+ <data key="e_mo_name">Data Theft</data>
537
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
538
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
539
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
540
+ <data key="e_lifecycle_stage">complete-mission</data>
541
+ <data key="e_disposition">Unprocessed</data>
542
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
543
+ </edge>
544
+ <edge id="e25" source="HOST-2890" target="HOST-2757">
545
+ <data key="e_type">INCIDENT_LINK</data>
546
+ <data key="e_timestamp">1708376785</data>
547
+ <data key="e_label_binary">malicious</data>
548
+ <data key="e_label_confidence">0.7</data>
549
+ <data key="e_suspicion_score">0.25</data>
550
+ <data key="e_mo_name">Data Theft</data>
551
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
552
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
553
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
554
+ <data key="e_lifecycle_stage">complete-mission</data>
555
+ <data key="e_disposition">Unprocessed</data>
556
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
557
+ </edge>
558
+ <edge id="e26" source="HOST-2757" target="HOST-2890">
559
+ <data key="e_type">INCIDENT_LINK</data>
560
+ <data key="e_timestamp">1708376785</data>
561
+ <data key="e_label_binary">malicious</data>
562
+ <data key="e_label_confidence">0.7</data>
563
+ <data key="e_suspicion_score">0.25</data>
564
+ <data key="e_mo_name">Data Theft</data>
565
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
566
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
567
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
568
+ <data key="e_lifecycle_stage">complete-mission</data>
569
+ <data key="e_disposition">Unprocessed</data>
570
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
571
+ </edge>
572
+ <edge id="e27" source="HOST-2902" target="HOST-2711">
573
+ <data key="e_type">INCIDENT_LINK</data>
574
+ <data key="e_timestamp">1708376785</data>
575
+ <data key="e_label_binary">malicious</data>
576
+ <data key="e_label_confidence">0.7</data>
577
+ <data key="e_suspicion_score">0.25</data>
578
+ <data key="e_mo_name">Data Theft</data>
579
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
580
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
581
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
582
+ <data key="e_lifecycle_stage">complete-mission</data>
583
+ <data key="e_disposition">Unprocessed</data>
584
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
585
+ </edge>
586
+ <edge id="e28" source="HOST-2711" target="HOST-2902">
587
+ <data key="e_type">INCIDENT_LINK</data>
588
+ <data key="e_timestamp">1708376785</data>
589
+ <data key="e_label_binary">malicious</data>
590
+ <data key="e_label_confidence">0.7</data>
591
+ <data key="e_suspicion_score">0.25</data>
592
+ <data key="e_mo_name">Data Theft</data>
593
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
594
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
595
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
596
+ <data key="e_lifecycle_stage">complete-mission</data>
597
+ <data key="e_disposition">Unprocessed</data>
598
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
599
+ </edge>
600
+ <edge id="e29" source="e94aea30-502f-11ee-bf8a-7905ff4a6380" target="HOST-2711">
601
+ <data key="e_type">INCIDENT_LINK</data>
602
+ <data key="e_timestamp">1708376785</data>
603
+ <data key="e_label_binary">malicious</data>
604
+ <data key="e_label_confidence">0.7</data>
605
+ <data key="e_suspicion_score">0.25</data>
606
+ <data key="e_mo_name">Data Theft</data>
607
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
608
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
609
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
610
+ <data key="e_lifecycle_stage">complete-mission</data>
611
+ <data key="e_disposition">Unprocessed</data>
612
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
613
+ </edge>
614
+ <edge id="e30" source="HOST-2711" target="e94aea30-502f-11ee-bf8a-7905ff4a6380">
615
+ <data key="e_type">INCIDENT_LINK</data>
616
+ <data key="e_timestamp">1708376785</data>
617
+ <data key="e_label_binary">malicious</data>
618
+ <data key="e_label_confidence">0.7</data>
619
+ <data key="e_suspicion_score">0.25</data>
620
+ <data key="e_mo_name">Data Theft</data>
621
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
622
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
623
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
624
+ <data key="e_lifecycle_stage">complete-mission</data>
625
+ <data key="e_disposition">Unprocessed</data>
626
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
627
+ </edge>
628
+ <edge id="e31" source="HOST-3648" target="HOST-2758">
629
+ <data key="e_type">INCIDENT_LINK</data>
630
+ <data key="e_timestamp">1708376785</data>
631
+ <data key="e_label_binary">malicious</data>
632
+ <data key="e_label_confidence">0.7</data>
633
+ <data key="e_suspicion_score">0.25</data>
634
+ <data key="e_mo_name">Data Theft</data>
635
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
636
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
637
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
638
+ <data key="e_lifecycle_stage">complete-mission</data>
639
+ <data key="e_disposition">Unprocessed</data>
640
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
641
+ </edge>
642
+ <edge id="e32" source="HOST-2758" target="HOST-3648">
643
+ <data key="e_type">INCIDENT_LINK</data>
644
+ <data key="e_timestamp">1708376785</data>
645
+ <data key="e_label_binary">malicious</data>
646
+ <data key="e_label_confidence">0.7</data>
647
+ <data key="e_suspicion_score">0.25</data>
648
+ <data key="e_mo_name">Data Theft</data>
649
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
650
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
651
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
652
+ <data key="e_lifecycle_stage">complete-mission</data>
653
+ <data key="e_disposition">Unprocessed</data>
654
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
655
+ </edge>
656
+ <edge id="e33" source="caed0312-0643-11ee-ab31-d9cf07186757" target="HOST-2758">
657
+ <data key="e_type">INCIDENT_LINK</data>
658
+ <data key="e_timestamp">1708376785</data>
659
+ <data key="e_label_binary">malicious</data>
660
+ <data key="e_label_confidence">0.7</data>
661
+ <data key="e_suspicion_score">0.25</data>
662
+ <data key="e_mo_name">Data Theft</data>
663
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
664
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
665
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
666
+ <data key="e_lifecycle_stage">complete-mission</data>
667
+ <data key="e_disposition">Unprocessed</data>
668
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
669
+ </edge>
670
+ <edge id="e34" source="HOST-2758" target="caed0312-0643-11ee-ab31-d9cf07186757">
671
+ <data key="e_type">INCIDENT_LINK</data>
672
+ <data key="e_timestamp">1708376785</data>
673
+ <data key="e_label_binary">malicious</data>
674
+ <data key="e_label_confidence">0.7</data>
675
+ <data key="e_suspicion_score">0.25</data>
676
+ <data key="e_mo_name">Data Theft</data>
677
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
678
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
679
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
680
+ <data key="e_lifecycle_stage">complete-mission</data>
681
+ <data key="e_disposition">Unprocessed</data>
682
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
683
+ </edge>
684
+ <edge id="e35" source="HOST-5404" target="HOST-2758">
685
+ <data key="e_type">INCIDENT_LINK</data>
686
+ <data key="e_timestamp">1708376785</data>
687
+ <data key="e_label_binary">malicious</data>
688
+ <data key="e_label_confidence">0.7</data>
689
+ <data key="e_suspicion_score">0.25</data>
690
+ <data key="e_mo_name">Data Theft</data>
691
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
692
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
693
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
694
+ <data key="e_lifecycle_stage">complete-mission</data>
695
+ <data key="e_disposition">Unprocessed</data>
696
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
697
+ </edge>
698
+ <edge id="e36" source="HOST-2758" target="HOST-5404">
699
+ <data key="e_type">INCIDENT_LINK</data>
700
+ <data key="e_timestamp">1708376785</data>
701
+ <data key="e_label_binary">malicious</data>
702
+ <data key="e_label_confidence">0.7</data>
703
+ <data key="e_suspicion_score">0.25</data>
704
+ <data key="e_mo_name">Data Theft</data>
705
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
706
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
707
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
708
+ <data key="e_lifecycle_stage">complete-mission</data>
709
+ <data key="e_disposition">Unprocessed</data>
710
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
711
+ </edge>
712
+ <edge id="e37" source="HOST-7847" target="HOST-2844">
713
+ <data key="e_type">INCIDENT_LINK</data>
714
+ <data key="e_timestamp">1708376785</data>
715
+ <data key="e_label_binary">malicious</data>
716
+ <data key="e_label_confidence">0.7</data>
717
+ <data key="e_suspicion_score">0.25</data>
718
+ <data key="e_mo_name">Data Theft</data>
719
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
720
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
721
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
722
+ <data key="e_lifecycle_stage">complete-mission</data>
723
+ <data key="e_disposition">Unprocessed</data>
724
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
725
+ </edge>
726
+ <edge id="e38" source="HOST-2844" target="HOST-7847">
727
+ <data key="e_type">INCIDENT_LINK</data>
728
+ <data key="e_timestamp">1708376785</data>
729
+ <data key="e_label_binary">malicious</data>
730
+ <data key="e_label_confidence">0.7</data>
731
+ <data key="e_suspicion_score">0.25</data>
732
+ <data key="e_mo_name">Data Theft</data>
733
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
734
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
735
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
736
+ <data key="e_lifecycle_stage">complete-mission</data>
737
+ <data key="e_disposition">Unprocessed</data>
738
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
739
+ </edge>
740
+ <edge id="e39" source="HOST-7081" target="HOST-2858">
741
+ <data key="e_type">INCIDENT_LINK</data>
742
+ <data key="e_timestamp">1708376785</data>
743
+ <data key="e_label_binary">malicious</data>
744
+ <data key="e_label_confidence">0.7</data>
745
+ <data key="e_suspicion_score">0.25</data>
746
+ <data key="e_mo_name">Data Theft</data>
747
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
748
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
749
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
750
+ <data key="e_lifecycle_stage">complete-mission</data>
751
+ <data key="e_disposition">Unprocessed</data>
752
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
753
+ </edge>
754
+ <edge id="e40" source="HOST-4477" target="HOST-2844">
755
+ <data key="e_type">INCIDENT_LINK</data>
756
+ <data key="e_timestamp">1708376785</data>
757
+ <data key="e_label_binary">malicious</data>
758
+ <data key="e_label_confidence">0.7</data>
759
+ <data key="e_suspicion_score">0.25</data>
760
+ <data key="e_mo_name">Data Theft</data>
761
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
762
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
763
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
764
+ <data key="e_lifecycle_stage">complete-mission</data>
765
+ <data key="e_disposition">Unprocessed</data>
766
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
767
+ </edge>
768
+ <edge id="e41" source="HOST-2844" target="HOST-4477">
769
+ <data key="e_type">INCIDENT_LINK</data>
770
+ <data key="e_timestamp">1708376785</data>
771
+ <data key="e_label_binary">malicious</data>
772
+ <data key="e_label_confidence">0.7</data>
773
+ <data key="e_suspicion_score">0.25</data>
774
+ <data key="e_mo_name">Data Theft</data>
775
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
776
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
777
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
778
+ <data key="e_lifecycle_stage">complete-mission</data>
779
+ <data key="e_disposition">Unprocessed</data>
780
+ <data key="e_incident_id">be289e00-cf6a-11ee-91bc-e1cf8103bf6f</data>
781
+ </edge>
782
+ </graph>
783
+ </graphml>
graph/incidents_graphml/b/be28cd70-f613-11ed-a3d6-ad85d59eee66.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4b7c99c0-9d8d-11ed-98f8-cd6642d241c0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.72.69</data>
35
+ <data key="n_hostname">100.64.72.69</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
39
+ </node>
40
+ <node id="59785ec4-9d87-11ed-98f8-cd6642d241c0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.27.73</data>
43
+ <data key="n_hostname">100.64.27.73</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
47
+ </node>
48
+ <node id="0d3ecaa2-9d8a-11ed-9ba1-69c845a45d44">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.3.153</data>
51
+ <data key="n_hostname">100.64.3.153</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
55
+ </node>
56
+ <edge id="e1" source="4b7c99c0-9d8d-11ed-98f8-cd6642d241c0" target="59785ec4-9d87-11ed-98f8-cd6642d241c0">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1684480017</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7890625</data>
61
+ <data key="e_suspicion_score">0.7890625</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">be28cd70-f613-11ed-a3d6-ad85d59eee66</data>
69
+ </edge>
70
+ <edge id="e2" source="59785ec4-9d87-11ed-98f8-cd6642d241c0" target="4b7c99c0-9d8d-11ed-98f8-cd6642d241c0">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1684480017</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7890625</data>
75
+ <data key="e_suspicion_score">0.7890625</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">be28cd70-f613-11ed-a3d6-ad85d59eee66</data>
83
+ </edge>
84
+ <edge id="e3" source="4b7c99c0-9d8d-11ed-98f8-cd6642d241c0" target="0d3ecaa2-9d8a-11ed-9ba1-69c845a45d44">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1684480017</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.7890625</data>
89
+ <data key="e_suspicion_score">0.7890625</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">be28cd70-f613-11ed-a3d6-ad85d59eee66</data>
97
+ </edge>
98
+ <edge id="e4" source="0d3ecaa2-9d8a-11ed-9ba1-69c845a45d44" target="4b7c99c0-9d8d-11ed-98f8-cd6642d241c0">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1684480017</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.7890625</data>
103
+ <data key="e_suspicion_score">0.7890625</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">be28cd70-f613-11ed-a3d6-ad85d59eee66</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/b/be29bb50-cb8c-11ee-9d8c-014a3c92d0a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b65f9033-aab6-11ee-b6ae-af8e9e75d7cf">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.59.22</data>
35
+ <data key="n_hostname">100.64.59.22</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.1.127</data>
43
+ <data key="n_hostname">172.29.1.127</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="b65f9033-aab6-11ee-b6ae-af8e9e75d7cf" target="HOST-2713">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1707951584</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">be29bb50-cb8c-11ee-9d8c-014a3c92d0a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be2edc40-2d5b-11ee-9400-61c78ce5335d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.22.127.96</data>
35
+ <data key="n_hostname">172.22.127.96</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="37eac321-07a3-11ee-8369-f7804467b915">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.43.122</data>
43
+ <data key="n_hostname">100.64.43.122</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2726" target="HOST-7722">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690558255</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">be2edc40-2d5b-11ee-9400-61c78ce5335d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be33c870-3e29-11ee-b681-89e3497f1d7e.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.54.66</data>
35
+ <data key="n_hostname">172.24.54.66</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0f283041-0626-11ee-b404-ff2ea490fc35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.9.100</data>
43
+ <data key="n_hostname">100.64.9.100</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2745" target="HOST-3030">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692405950</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">be33c870-3e29-11ee-b681-89e3497f1d7e</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be35f050-cb8c-11ee-9d8c-014a3c92d0a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.1.127</data>
35
+ <data key="n_hostname">172.29.1.127</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b65f9033-aab6-11ee-b6ae-af8e9e75d7cf">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.59.22</data>
43
+ <data key="n_hostname">100.64.59.22</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2713" target="HOST-10035">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1707951584</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be35f050-cb8c-11ee-9d8c-014a3c92d0a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be3a7230-a060-11ee-9181-41cbe26a7b16.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bceb9f2b-a020-11ee-9577-6b437ad5f87f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.41</data>
35
+ <data key="n_hostname">100.64.68.41</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.746875</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="c9c2af8d-0625-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.23</data>
43
+ <data key="n_hostname">100.64.68.23</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
47
+ </node>
48
+ <edge id="e1" source="bceb9f2b-a020-11ee-9577-6b437ad5f87f" target="HOST-11393">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703204786</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.746875</data>
53
+ <data key="e_suspicion_score">0.746875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be3a7230-a060-11ee-9181-41cbe26a7b16</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-11393" target="bceb9f2b-a020-11ee-9577-6b437ad5f87f">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1703204786</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.746875</data>
67
+ <data key="e_suspicion_score">0.746875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">be3a7230-a060-11ee-9181-41cbe26a7b16</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/b/be3d1510-2f74-11ee-8001-3b5fed8c9dd3.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0fb15250-2cc6-11ee-b811-1bf83c6c4911">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.57.188</data>
35
+ <data key="n_hostname">100.64.57.188</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.229.11</data>
43
+ <data key="n_hostname">172.30.229.11</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="0fb15250-2cc6-11ee-b811-1bf83c6c4911" target="HOST-2750">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690788895</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">be3d1510-2f74-11ee-8001-3b5fed8c9dd3</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be3e4440-117d-11ee-b107-2764325d5a51.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="6a944122-1090-11ee-a0fd-2b70b5043c8d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.60.154</data>
35
+ <data key="n_hostname">100.64.60.154</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.208.219</data>
43
+ <data key="n_hostname">172.30.208.219</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="6a944122-1090-11ee-a0fd-2b70b5043c8d" target="HOST-2823">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687494225</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be3e4440-117d-11ee-b107-2764325d5a51</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-2823" target="6a944122-1090-11ee-a0fd-2b70b5043c8d">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1687494225</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">be3e4440-117d-11ee-b107-2764325d5a51</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/b/be43c370-edf0-11ee-aef3-7fbaf9d61c41.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.201.119</data>
35
+ <data key="n_hostname">172.30.201.119</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="62300739-0627-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.45.157</data>
43
+ <data key="n_hostname">100.64.45.157</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2760" target="62300739-0627-11ee-94f6-0d301f382bbb">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1711732873</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be43c370-edf0-11ee-aef3-7fbaf9d61c41</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be4906a0-ffe3-11ee-b8be-512e5047d566.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="766f2a90-2847-11ee-ae8d-b56e8c062a11">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.33.175</data>
35
+ <data key="n_hostname">100.64.33.175</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.214.148</data>
43
+ <data key="n_hostname">172.30.214.148</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-6366" target="HOST-2720">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713706411</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be4906a0-ffe3-11ee-b8be-512e5047d566</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be4d2280-ebef-11ec-9679-75d3d6184114.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="13dcb940-ea92-11ec-abf7-619673fe2558">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.71.80</data>
35
+ <data key="n_hostname">100.64.71.80</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="e9623e10-ea91-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.76.116</data>
43
+ <data key="n_hostname">USER-0015-1741.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12642" target="HOST-14218">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1655217546</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be4d2280-ebef-11ec-9679-75d3d6184114</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-14218" target="HOST-12642">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1655217546</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7890625</data>
67
+ <data key="e_suspicion_score">0.7890625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">be4d2280-ebef-11ec-9679-75d3d6184114</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/b/be583f00-0d16-11ee-9392-932bfd273540.graphml ADDED
@@ -0,0 +1,135 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b97accd1-06c9-11ee-9422-7fd0446b91aa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.21.65</data>
35
+ <data key="n_hostname">100.64.21.65</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.68359375</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="1a2ad020-0639-11ee-afe7-f371512a14a3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.42</data>
43
+ <data key="n_hostname">100.64.72.42</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="3a88fa81-062b-11ee-8ffb-516c3122460e">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.73.39</data>
51
+ <data key="n_hostname">100.64.73.39</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
55
+ </node>
56
+ <node id="b8ff3f01-062b-11ee-8b63-19546bc2fdf3">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.70.250</data>
59
+ <data key="n_hostname">100.64.70.250</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
63
+ </node>
64
+ <edge id="e1" source="HOST-13439" target="HOST-14713">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1687010183</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.71875</data>
69
+ <data key="e_suspicion_score">0.71875</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">be583f00-0d16-11ee-9392-932bfd273540</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-14713" target="HOST-13439">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1687010183</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.71875</data>
83
+ <data key="e_suspicion_score">0.71875</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">be583f00-0d16-11ee-9392-932bfd273540</data>
91
+ </edge>
92
+ <edge id="e3" source="HOST-13439" target="HOST-14322">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1687010183</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.71875</data>
97
+ <data key="e_suspicion_score">0.71875</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">be583f00-0d16-11ee-9392-932bfd273540</data>
105
+ </edge>
106
+ <edge id="e4" source="HOST-14322" target="HOST-13439">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1687010183</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.71875</data>
111
+ <data key="e_suspicion_score">0.71875</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">be583f00-0d16-11ee-9392-932bfd273540</data>
119
+ </edge>
120
+ <edge id="e5" source="HOST-13439" target="HOST-13864">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1687010183</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.71875</data>
125
+ <data key="e_suspicion_score">0.71875</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">be583f00-0d16-11ee-9392-932bfd273540</data>
133
+ </edge>
134
+ </graph>
135
+ </graphml>
graph/incidents_graphml/b/be5a98c0-f6a1-11ee-8b23-bde5dce38992.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8bbe9ac2-8a08-11ee-a737-d35d6de933b4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.22.18</data>
35
+ <data key="n_hostname">100.64.22.18</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.208.219</data>
43
+ <data key="n_hostname">172.30.208.219</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="8bbe9ac2-8a08-11ee-a737-d35d6de933b4" target="HOST-2823">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1712688503</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">be5a98c0-f6a1-11ee-8b23-bde5dce38992</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be5f2330-cb8c-11ee-9d8c-014a3c92d0a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a6690492-abd8-11ee-ad83-c50df8dbbb95">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.59.24</data>
35
+ <data key="n_hostname">100.64.59.24</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.174.172</data>
43
+ <data key="n_hostname">172.30.174.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="a6690492-abd8-11ee-ad83-c50df8dbbb95" target="HOST-2946">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1707951584</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be5f2330-cb8c-11ee-9d8c-014a3c92d0a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be62e490-2d5b-11ee-9400-61c78ce5335d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.182.227</data>
35
+ <data key="n_hostname">172.31.182.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8d01ae63-0e0f-11ee-a496-e3cc7c0f6d11">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.18.251</data>
43
+ <data key="n_hostname">100.64.18.251</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2761" target="HOST-4327">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690558255</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be62e490-2d5b-11ee-9400-61c78ce5335d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be662630-21fe-11ef-a065-0d11f2930c39.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bdea6680-21fe-11ef-aaa9-5917491e690f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.32.153</data>
35
+ <data key="n_hostname">100.64.32.153</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.25.222.10</data>
43
+ <data key="n_hostname">172.25.222.10</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="bdea6680-21fe-11ef-aaa9-5917491e690f" target="HOST-2768">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1717456347</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be662630-21fe-11ef-a065-0d11f2930c39</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be6b96c0-edf0-11ee-aef3-7fbaf9d61c41.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="179bcaa1-ed95-11ee-9ea1-0d6693bae781">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.45.159</data>
35
+ <data key="n_hostname">100.64.45.159</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f4-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.135.251.191</data>
43
+ <data key="n_hostname">10.135.251.191</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="179bcaa1-ed95-11ee-9ea1-0d6693bae781" target="HOST-2751">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1711732873</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be6b96c0-edf0-11ee-aef3-7fbaf9d61c41</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.174.172</data>
35
+ <data key="n_hostname">172.30.174.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a6690492-abd8-11ee-ad83-c50df8dbbb95">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.59.24</data>
43
+ <data key="n_hostname">100.64.59.24</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2946" target="HOST-10036">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1707951584</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/b/be6e3f00-6c00-11ee-9973-9b86183b2cfc.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8c867744-126a-11ee-98ae-c11e532db376">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.45.157</data>
35
+ <data key="n_hostname">USER-0015-2038.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="638b5b01-95e5-11ed-b28e-ad8d3bab1fa5">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.221.82.8</data>
43
+ <data key="n_hostname">10.221.82.8</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
47
+ </node>
48
+ <edge id="e1" source="8c867744-126a-11ee-98ae-c11e532db376" target="HOST-17427">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697446094</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">be6e3f00-6c00-11ee-9973-9b86183b2cfc</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>