diff --git a/graph/incidents_graphml/b/bdab66a0-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/bdab66a0-3d0d-11ee-ba1f-812391e2855d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86f12fd17cdb4647ae081756bec846b192f1b2dc --- /dev/null +++ b/graph/incidents_graphml/b/bdab66a0-3d0d-11ee-ba1f-812391e2855d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.30 + 100.64.66.30 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283972 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bdab66a0-3d0d-11ee-ba1f-812391e2855d + + + diff --git a/graph/incidents_graphml/b/bdb21760-311a-11ee-87a2-613e036775fd.graphml b/graph/incidents_graphml/b/bdb21760-311a-11ee-87a2-613e036775fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa01bfcfe541ee0288f1fe7168e85e1505c77af8 --- /dev/null +++ b/graph/incidents_graphml/b/bdb21760-311a-11ee-87a2-613e036775fd.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.64 + 100.64.58.64 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.65 + 100.64.58.65 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.66 + 100.64.58.66 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.67 + 100.64.58.67 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.68 + USER-0015-1427.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.69 + 100.64.58.69 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.70 + 100.64.58.70 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.207 + 100.64.11.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.71 + 100.64.58.71 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970141 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb21760-311a-11ee-87a2-613e036775fd + + + diff --git a/graph/incidents_graphml/b/bdb25870-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/b/bdb25870-5bee-11ee-82a0-9da780b0dcc4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38ea214267f2e769ea577de5e0dc60ee4d0b62ec --- /dev/null +++ b/graph/incidents_graphml/b/bdb25870-5bee-11ee-82a0-9da780b0dcc4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.202 + 100.64.12.202 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695679143 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bdb25870-5bee-11ee-82a0-9da780b0dcc4 + + + diff --git a/graph/incidents_graphml/b/bdb2b730-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/bdb2b730-6c00-11ee-9973-9b86183b2cfc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..faf0a885993ae6e3b400ef28322d66f0933d2417 --- /dev/null +++ b/graph/incidents_graphml/b/bdb2b730-6c00-11ee-9973-9b86183b2cfc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.90.14 + 100.64.90.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697446093 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bdb2b730-6c00-11ee-9973-9b86183b2cfc + + + diff --git a/graph/incidents_graphml/b/bdb6d7c0-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/b/bdb6d7c0-131d-11ee-8854-7b8acd154f2f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfd2c0f9ff46833c8dc29bbc59e23b2f8ecb4ff5 --- /dev/null +++ b/graph/incidents_graphml/b/bdb6d7c0-131d-11ee-8854-7b8acd154f2f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.34 + 100.64.53.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687672895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bdb6d7c0-131d-11ee-8854-7b8acd154f2f + + + diff --git a/graph/incidents_graphml/b/bdb75c00-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/b/bdb75c00-a166-11ed-863f-a161c6cf34a1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8686831c86e8d3431fb0bda1133d8b01af2dda92 --- /dev/null +++ b/graph/incidents_graphml/b/bdb75c00-a166-11ed-863f-a161c6cf34a1.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.107.156 + 192.168.107.156 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.211 + 100.64.86.211 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 192.168.17.89 + 192.168.17.89 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675169816 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb75c00-a166-11ed-863f-a161c6cf34a1 + + + INCIDENT_LINK + 1675169816 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb75c00-a166-11ed-863f-a161c6cf34a1 + + + INCIDENT_LINK + 1675169816 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb75c00-a166-11ed-863f-a161c6cf34a1 + + + INCIDENT_LINK + 1675169816 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdb75c00-a166-11ed-863f-a161c6cf34a1 + + + diff --git a/graph/incidents_graphml/b/bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f.graphml b/graph/incidents_graphml/b/bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..efa61b7dbffad2fd841ec0458353d0526f573628 --- /dev/null +++ b/graph/incidents_graphml/b/bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f.graphml @@ -0,0 +1,825 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.86 + 100.64.52.86 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.87 + 100.64.52.87 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.88 + 100.64.52.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.219 + 100.64.13.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.89 + 100.64.52.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.90 + 100.64.52.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.91 + 100.64.52.91 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.92 + 100.64.52.92 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.74 + 100.64.24.74 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.239 + 100.64.37.239 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.93 + USER-0015-1396.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.63 + 100.64.23.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.170 + 100.64.51.170 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.94 + 100.64.52.94 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.14 + 100.64.22.14 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + HOST-2906 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f + + + diff --git a/graph/incidents_graphml/b/bdbd55c0-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/bdbd55c0-2d5b-11ee-9400-61c78ce5335d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5a6101052544b9c5739720693eeefe0fa4b1ae1 --- /dev/null +++ b/graph/incidents_graphml/b/bdbd55c0-2d5b-11ee-9400-61c78ce5335d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.51 + USER-0015-1418.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690558254 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdbd55c0-2d5b-11ee-9400-61c78ce5335d + + + diff --git a/graph/incidents_graphml/b/bdbdb370-ba66-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/b/bdbdb370-ba66-11ed-ace2-c7d81fb15087.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d53c327d60c2b35791e0bb3289e693e5d6f5bba --- /dev/null +++ b/graph/incidents_graphml/b/bdbdb370-ba66-11ed-ace2-c7d81fb15087.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.230 + 100.64.75.230 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.200 + 100.64.72.200 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + INCIDENT_LINK + 1677918595 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdbdb370-ba66-11ed-ace2-c7d81fb15087 + + + diff --git a/graph/incidents_graphml/b/bdc10f10-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/bdc10f10-6c00-11ee-9973-9b86183b2cfc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03ed750e693dd4db91f7324d28d52c2542ab128e --- /dev/null +++ b/graph/incidents_graphml/b/bdc10f10-6c00-11ee-9973-9b86183b2cfc.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.130 + 100.64.57.130 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1697446093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdc10f10-6c00-11ee-9973-9b86183b2cfc + + + INCIDENT_LINK + 1697446093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdc10f10-6c00-11ee-9973-9b86183b2cfc + + + INCIDENT_LINK + 1697446093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdc10f10-6c00-11ee-9973-9b86183b2cfc + + + diff --git a/graph/incidents_graphml/b/bdc19ab0-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/b/bdc19ab0-5bee-11ee-82a0-9da780b0dcc4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90914ed7e6aa986a8055def6ca6ce0d2cf684574 --- /dev/null +++ b/graph/incidents_graphml/b/bdc19ab0-5bee-11ee-82a0-9da780b0dcc4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.202 + 100.64.12.202 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695679143 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bdc19ab0-5bee-11ee-82a0-9da780b0dcc4 + + + diff --git a/graph/incidents_graphml/b/bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fec7c1d11e287afed8b2bf427fb04acf4145adb --- /dev/null +++ b/graph/incidents_graphml/b/bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.53 + 100.64.33.53 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951583 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/b/bdccd150-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/bdccd150-3d0d-11ee-ba1f-812391e2855d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8f67e427f9e9b438c5408d0448bf0c6c0b62d98 --- /dev/null +++ b/graph/incidents_graphml/b/bdccd150-3d0d-11ee-ba1f-812391e2855d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.32 + 100.64.66.32 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283972 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdccd150-3d0d-11ee-ba1f-812391e2855d + + + diff --git a/graph/incidents_graphml/b/bdd07860-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/bdd07860-6c00-11ee-9973-9b86183b2cfc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44cfb877a75ee59adf4dfac0785515e2df26f98a --- /dev/null +++ b/graph/incidents_graphml/b/bdd07860-6c00-11ee-9973-9b86183b2cfc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.57.130 + 100.64.57.130 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697446093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bdd07860-6c00-11ee-9973-9b86183b2cfc + + + diff --git a/graph/incidents_graphml/b/bdea14f0-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/b/bdea14f0-41fd-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc0c1315c58c75adfde27c52a8719e7be440c9c4 --- /dev/null +++ b/graph/incidents_graphml/b/bdea14f0-41fd-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.133 + 100.64.66.133 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692826856 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdea14f0-41fd-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/b/bdeefa80-00b9-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/b/bdeefa80-00b9-11ef-8b56-b9c5ad676a8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e682d3875265dba0458be0b87d46e60474fdc88 --- /dev/null +++ b/graph/incidents_graphml/b/bdeefa80-00b9-11ef-8b56-b9c5ad676a8a.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.168 + 100.64.70.168 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"] + + + HOST + 100.64.70.93 + 100.64.70.93 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.169 + USER-0015-1596.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713798322 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdeefa80-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798322 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdeefa80-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798322 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdeefa80-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798322 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdeefa80-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798322 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdeefa80-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798322 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdeefa80-00b9-11ef-8b56-b9c5ad676a8a + + + diff --git a/graph/incidents_graphml/b/bdf6e800-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/b/bdf6e800-f613-11ed-a3d6-ad85d59eee66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4dcc9dd06665f7d709d1601da44fd8dfd07e937c --- /dev/null +++ b/graph/incidents_graphml/b/bdf6e800-f613-11ed-a3d6-ad85d59eee66.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.65 + 100.64.48.65 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.119 + 100.64.71.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.4.2 + 100.64.4.2 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1684480017 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdf6e800-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480017 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdf6e800-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480017 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdf6e800-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480017 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bdf6e800-f613-11ed-a3d6-ad85d59eee66 + + + diff --git a/graph/incidents_graphml/b/bdf9cc60-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/b/bdf9cc60-41fd-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5267a90449e8792f10b01ed8e4e0e61b62830b40 --- /dev/null +++ b/graph/incidents_graphml/b/bdf9cc60-41fd-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.133 + 100.64.66.133 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692826856 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bdf9cc60-41fd-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/b/bdf9cc70-a070-11ee-8eba-81c30328b488.graphml b/graph/incidents_graphml/b/bdf9cc70-a070-11ee-8eba-81c30328b488.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85a1090e267faa74ae86196c576d64c8b11cd216 --- /dev/null +++ b/graph/incidents_graphml/b/bdf9cc70-a070-11ee-8eba-81c30328b488.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.157 + 100.64.53.157 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703211657 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdf9cc70-a070-11ee-8eba-81c30328b488 + + + diff --git a/graph/incidents_graphml/b/bdfa2e80-6cba-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/b/bdfa2e80-6cba-11ed-88c8-935f200141c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0754f31b0171dedf4705e1ce0a5df2454afd2ca3 --- /dev/null +++ b/graph/incidents_graphml/b/bdfa2e80-6cba-11ed-88c8-935f200141c8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.87 + 100.64.72.87 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.49 + 100.64.1.49 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1669378482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdfa2e80-6cba-11ed-88c8-935f200141c8 + + + INCIDENT_LINK + 1669378482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bdfa2e80-6cba-11ed-88c8-935f200141c8 + + + diff --git a/graph/incidents_graphml/b/bdfa37b0-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/bdfa37b0-2d5b-11ee-9400-61c78ce5335d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19f61f31279a5fe223f3b0cb2bba21b28fdeaa55 --- /dev/null +++ b/graph/incidents_graphml/b/bdfa37b0-2d5b-11ee-9400-61c78ce5335d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.51 + USER-0015-1418.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690558255 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bdfa37b0-2d5b-11ee-9400-61c78ce5335d + + + diff --git a/graph/incidents_graphml/b/be02f970-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be02f970-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64c6a2d5c537e6c08bc849b95f0364d6925ec151 --- /dev/null +++ b/graph/incidents_graphml/b/be02f970-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.4 + 100.64.29.4 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951583 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be02f970-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/b/be045ed0-3b73-11ef-b1e4-3da31b742190.graphml b/graph/incidents_graphml/b/be045ed0-3b73-11ef-b1e4-3da31b742190.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6e6ca83aeb8ab0621d5bf1f820a2776898ffbe3 --- /dev/null +++ b/graph/incidents_graphml/b/be045ed0-3b73-11ef-b1e4-3da31b742190.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.239 + 100.64.21.239 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.30 + 100.64.46.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.31 + 100.64.46.31 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.230 + 100.64.20.230 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.255 + 100.64.23.255 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.32 + 100.64.46.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + INCIDENT_LINK + 1720255376 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be045ed0-3b73-11ef-b1e4-3da31b742190 + + + diff --git a/graph/incidents_graphml/b/be074240-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/be074240-3d0d-11ee-ba1f-812391e2855d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5a737c9c0184e247c09d588def0c8cdd1f80f26 --- /dev/null +++ b/graph/incidents_graphml/b/be074240-3d0d-11ee-ba1f-812391e2855d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.32 + 100.64.66.32 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283973 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be074240-3d0d-11ee-ba1f-812391e2855d + + + diff --git a/graph/incidents_graphml/b/be083320-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/b/be083320-f9fb-11ee-a91e-b385ff48b568.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b24d2f580c54b930478f4d220f959ba5c65746b --- /dev/null +++ b/graph/incidents_graphml/b/be083320-f9fb-11ee-a91e-b385ff48b568.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.126 + 100.64.9.126 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1713057011 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be083320-f9fb-11ee-a91e-b385ff48b568 + + + diff --git a/graph/incidents_graphml/b/be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..923c2cd0ba02710746a8ecdfcf57e7953fb16d6e --- /dev/null +++ b/graph/incidents_graphml/b/be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.4 + 100.64.29.4 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951584 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/b/be10b0b0-4a09-11ee-8bf8-c1f4992fd587.graphml b/graph/incidents_graphml/b/be10b0b0-4a09-11ee-8bf8-c1f4992fd587.graphml new file mode 100644 index 0000000000000000000000000000000000000000..678449087e978f9e3807c0fb382c71aa11500c70 --- /dev/null +++ b/graph/incidents_graphml/b/be10b0b0-4a09-11ee-8bf8-c1f4992fd587.graphml @@ -0,0 +1,359 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.67 + 100.64.33.67 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.189 + 100.64.17.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.68 + 100.64.33.68 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.190 + 100.64.32.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.69 + 100.64.33.69 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.70 + 100.64.33.70 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.71 + HOST-6312 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.72 + 100.64.33.72 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.176 + 100.64.17.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + INCIDENT_LINK + 1693711619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be10b0b0-4a09-11ee-8bf8-c1f4992fd587 + + + diff --git a/graph/incidents_graphml/b/be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8724ca0a5713ddcbddd5dfbdf8946c4768f71134 --- /dev/null +++ b/graph/incidents_graphml/b/be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.46 + 100.64.10.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951584 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/b/be226350-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/be226350-3e29-11ee-b681-89e3497f1d7e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6208fd7e3f723f0bed1047f274ce7cd4e05c677 --- /dev/null +++ b/graph/incidents_graphml/b/be226350-3e29-11ee-b681-89e3497f1d7e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692405950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be226350-3e29-11ee-b681-89e3497f1d7e + + + diff --git a/graph/incidents_graphml/b/be256290-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/b/be256290-1c3c-11ed-9dc4-eb234c0496d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3f3dd57f6f30cbe1968358b576209d91a16608b --- /dev/null +++ b/graph/incidents_graphml/b/be256290-1c3c-11ed-9dc4-eb234c0496d2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.37 + 100.64.78.37 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.89 + 100.64.73.89 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660528273 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be256290-1c3c-11ed-9dc4-eb234c0496d2 + + + INCIDENT_LINK + 1660528273 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be256290-1c3c-11ed-9dc4-eb234c0496d2 + + + diff --git a/graph/incidents_graphml/b/be289e00-cf6a-11ee-91bc-e1cf8103bf6f.graphml b/graph/incidents_graphml/b/be289e00-cf6a-11ee-91bc-e1cf8103bf6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f08fa353d4216a84ccea44b53b6b3a81d2e06483 --- /dev/null +++ b/graph/incidents_graphml/b/be289e00-cf6a-11ee-91bc-e1cf8103bf6f.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.152 + 100.64.19.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.104 + 100.64.52.104 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.126 + 100.64.2.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.29 + 100.64.39.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.178 + 100.64.26.178 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.254 + 100.64.3.254 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.118 + 100.64.16.118 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.188 + 100.64.5.188 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.105 + 100.64.52.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.252 + 100.64.9.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.108 + 100.64.8.108 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.120 + 100.64.8.120 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.106 + 100.64.52.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.22 + 100.64.14.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.107 + 100.64.52.107 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.34 + 100.64.7.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.130 + 100.64.18.130 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be289e00-cf6a-11ee-91bc-e1cf8103bf6f + + + diff --git a/graph/incidents_graphml/b/be28cd70-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/b/be28cd70-f613-11ed-a3d6-ad85d59eee66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e95e2f128fa2c6ab53a09f98b114b974402238b --- /dev/null +++ b/graph/incidents_graphml/b/be28cd70-f613-11ed-a3d6-ad85d59eee66.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.69 + 100.64.72.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.27.73 + 100.64.27.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.3.153 + 100.64.3.153 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684480017 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be28cd70-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480017 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be28cd70-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480017 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be28cd70-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480017 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be28cd70-f613-11ed-a3d6-ad85d59eee66 + + + diff --git a/graph/incidents_graphml/b/be29bb50-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be29bb50-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aafc3e2d00e4bf685879e263d13c2016ee73f4e1 --- /dev/null +++ b/graph/incidents_graphml/b/be29bb50-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.22 + 100.64.59.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951584 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be29bb50-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/b/be2edc40-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/be2edc40-2d5b-11ee-9400-61c78ce5335d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3bb355a55ca58f89d49d7a1a0cd224cc4d216c5 --- /dev/null +++ b/graph/incidents_graphml/b/be2edc40-2d5b-11ee-9400-61c78ce5335d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690558255 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + be2edc40-2d5b-11ee-9400-61c78ce5335d + + + diff --git a/graph/incidents_graphml/b/be33c870-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/be33c870-3e29-11ee-b681-89e3497f1d7e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29c9316600d9a3f3921bc32d3369c019890b11f7 --- /dev/null +++ b/graph/incidents_graphml/b/be33c870-3e29-11ee-b681-89e3497f1d7e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692405950 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + be33c870-3e29-11ee-b681-89e3497f1d7e + + + diff --git a/graph/incidents_graphml/b/be35f050-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be35f050-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1212ac8bebefba199b695a65ad0e5505e405650 --- /dev/null +++ b/graph/incidents_graphml/b/be35f050-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.22 + 100.64.59.22 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951584 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be35f050-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/b/be3a7230-a060-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/b/be3a7230-a060-11ee-9181-41cbe26a7b16.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78eee952cef779af4149e5c73a70643a2f646272 --- /dev/null +++ b/graph/incidents_graphml/b/be3a7230-a060-11ee-9181-41cbe26a7b16.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.41 + 100.64.68.41 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1703204786 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be3a7230-a060-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703204786 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be3a7230-a060-11ee-9181-41cbe26a7b16 + + + diff --git a/graph/incidents_graphml/b/be3d1510-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/be3d1510-2f74-11ee-8001-3b5fed8c9dd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f61073cd62031723f5a1edf8ccbaf274b1c1e99 --- /dev/null +++ b/graph/incidents_graphml/b/be3d1510-2f74-11ee-8001-3b5fed8c9dd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.188 + 100.64.57.188 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690788895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be3d1510-2f74-11ee-8001-3b5fed8c9dd3 + + + diff --git a/graph/incidents_graphml/b/be3e4440-117d-11ee-b107-2764325d5a51.graphml b/graph/incidents_graphml/b/be3e4440-117d-11ee-b107-2764325d5a51.graphml new file mode 100644 index 0000000000000000000000000000000000000000..daa88c989ea5e2b89de83ee88c6afe1d72e5705f --- /dev/null +++ b/graph/incidents_graphml/b/be3e4440-117d-11ee-b107-2764325d5a51.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.154 + 100.64.60.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687494225 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be3e4440-117d-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494225 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be3e4440-117d-11ee-b107-2764325d5a51 + + + diff --git a/graph/incidents_graphml/b/be43c370-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/be43c370-edf0-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59cd4b591ef25cd5316365a4d2f3628a39bc21d6 --- /dev/null +++ b/graph/incidents_graphml/b/be43c370-edf0-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.157 + 100.64.45.157 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711732873 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be43c370-edf0-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/b/be4906a0-ffe3-11ee-b8be-512e5047d566.graphml b/graph/incidents_graphml/b/be4906a0-ffe3-11ee-b8be-512e5047d566.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12bec8daa32351740df1bf05d5ed6b2db7081f0c --- /dev/null +++ b/graph/incidents_graphml/b/be4906a0-ffe3-11ee-b8be-512e5047d566.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.175 + 100.64.33.175 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713706411 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be4906a0-ffe3-11ee-b8be-512e5047d566 + + + diff --git a/graph/incidents_graphml/b/be4d2280-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/be4d2280-ebef-11ec-9679-75d3d6184114.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3a3ce5941f6f16d9dffe74b00df9e10b5553c25 --- /dev/null +++ b/graph/incidents_graphml/b/be4d2280-ebef-11ec-9679-75d3d6184114.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.80 + 100.64.71.80 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.116 + USER-0015-1741.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655217546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be4d2280-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be4d2280-ebef-11ec-9679-75d3d6184114 + + + diff --git a/graph/incidents_graphml/b/be583f00-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/be583f00-0d16-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c4f9823f77dc8b703699aa5d93cb0ad7a32a361 --- /dev/null +++ b/graph/incidents_graphml/b/be583f00-0d16-11ee-9392-932bfd273540.graphml @@ -0,0 +1,135 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.65 + 100.64.21.65 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.42 + 100.64.72.42 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.39 + 100.64.73.39 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.250 + 100.64.70.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687010183 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be583f00-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010183 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be583f00-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010183 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be583f00-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010183 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be583f00-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010183 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be583f00-0d16-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/b/be5a98c0-f6a1-11ee-8b23-bde5dce38992.graphml b/graph/incidents_graphml/b/be5a98c0-f6a1-11ee-8b23-bde5dce38992.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e167b9691814bd49161a00a616fd2d753fa28e06 --- /dev/null +++ b/graph/incidents_graphml/b/be5a98c0-f6a1-11ee-8b23-bde5dce38992.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.18 + 100.64.22.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712688503 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be5a98c0-f6a1-11ee-8b23-bde5dce38992 + + + diff --git a/graph/incidents_graphml/b/be5f2330-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be5f2330-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11285f4c6f879630f4423fc8cbfefd9e065a9da0 --- /dev/null +++ b/graph/incidents_graphml/b/be5f2330-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.24 + 100.64.59.24 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951584 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be5f2330-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/b/be62e490-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/be62e490-2d5b-11ee-9400-61c78ce5335d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfaeba35c35c53f70bd2a0aeb20891a296e6f694 --- /dev/null +++ b/graph/incidents_graphml/b/be62e490-2d5b-11ee-9400-61c78ce5335d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.251 + 100.64.18.251 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690558255 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be62e490-2d5b-11ee-9400-61c78ce5335d + + + diff --git a/graph/incidents_graphml/b/be662630-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/b/be662630-21fe-11ef-a065-0d11f2930c39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d2fd17e669680edf56e7b66eff6287ca3d78516 --- /dev/null +++ b/graph/incidents_graphml/b/be662630-21fe-11ef-a065-0d11f2930c39.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.153 + 100.64.32.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717456347 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be662630-21fe-11ef-a065-0d11f2930c39 + + + diff --git a/graph/incidents_graphml/b/be6b96c0-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/be6b96c0-edf0-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a192330ca34325c12a1dc72b2fab76b83e675c92 --- /dev/null +++ b/graph/incidents_graphml/b/be6b96c0-edf0-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.159 + 100.64.45.159 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711732873 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be6b96c0-edf0-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/b/be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..117428479138fc728b7ddadaa8cd17b851f24119 --- /dev/null +++ b/graph/incidents_graphml/b/be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.24 + 100.64.59.24 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951584 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/b/be6e3f00-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/be6e3f00-6c00-11ee-9973-9b86183b2cfc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac573930e1f5fb1aed123fb70c0e52c8b73dfdf1 --- /dev/null +++ b/graph/incidents_graphml/b/be6e3f00-6c00-11ee-9973-9b86183b2cfc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.157 + USER-0015-2038.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1697446094 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be6e3f00-6c00-11ee-9973-9b86183b2cfc + + + diff --git a/graph/incidents_graphml/b/be71b9a0-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/be71b9a0-2f74-11ee-8001-3b5fed8c9dd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70d9de41f80fad35f871bc69f2c5aa8b7cf0d9ee --- /dev/null +++ b/graph/incidents_graphml/b/be71b9a0-2f74-11ee-8001-3b5fed8c9dd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.188 + 100.64.57.188 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690788895 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be71b9a0-2f74-11ee-8001-3b5fed8c9dd3 + + + diff --git a/graph/incidents_graphml/b/be748050-ba66-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/b/be748050-ba66-11ed-ace2-c7d81fb15087.graphml new file mode 100644 index 0000000000000000000000000000000000000000..527be0a510686440174d74269f79c834f8630282 --- /dev/null +++ b/graph/incidents_graphml/b/be748050-ba66-11ed-ace2-c7d81fb15087.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.231 + 100.64.75.231 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1677918596 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be748050-ba66-11ed-ace2-c7d81fb15087 + + + diff --git a/graph/incidents_graphml/b/be79d540-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/b/be79d540-21fe-11ef-a065-0d11f2930c39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6c44020feda27db64a05ffaf0a60411936340ab --- /dev/null +++ b/graph/incidents_graphml/b/be79d540-21fe-11ef-a065-0d11f2930c39.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.153 + 100.64.32.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717456347 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be79d540-21fe-11ef-a065-0d11f2930c39 + + + diff --git a/graph/incidents_graphml/b/be7b3710-ba66-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/b/be7b3710-ba66-11ed-ace2-c7d81fb15087.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56aa6c82afb8d278f7fe1b3d3b5ecc6e5ac9a5b8 --- /dev/null +++ b/graph/incidents_graphml/b/be7b3710-ba66-11ed-ace2-c7d81fb15087.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.231 + 100.64.75.231 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1677918596 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be7b3710-ba66-11ed-ace2-c7d81fb15087 + + + diff --git a/graph/incidents_graphml/b/be7d7110-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/be7d7110-edf0-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b22ae89b69f4211623d97a5e5ffb5278774aa806 --- /dev/null +++ b/graph/incidents_graphml/b/be7d7110-edf0-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.159 + 100.64.45.159 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711732873 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be7d7110-edf0-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/b/be7df670-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/be7df670-6c00-11ee-9973-9b86183b2cfc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5dd403908f721c145309deaf97e13da4d2293fb5 --- /dev/null +++ b/graph/incidents_graphml/b/be7df670-6c00-11ee-9973-9b86183b2cfc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.45.157 + USER-0015-2038.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697446094 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be7df670-6c00-11ee-9973-9b86183b2cfc + + + diff --git a/graph/incidents_graphml/b/be803ac0-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/be803ac0-3e29-11ee-b681-89e3497f1d7e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b49e0f7a2c7bb837b6976dcb0505aeb396dd053b --- /dev/null +++ b/graph/incidents_graphml/b/be803ac0-3e29-11ee-b681-89e3497f1d7e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.17 + 100.64.11.17 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692405950 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + be803ac0-3e29-11ee-b681-89e3497f1d7e + + + diff --git a/graph/incidents_graphml/b/be89ae70-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/be89ae70-2f74-11ee-8001-3b5fed8c9dd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6027cc148544271e0758c2c2fcf2d55d59acc02f --- /dev/null +++ b/graph/incidents_graphml/b/be89ae70-2f74-11ee-8001-3b5fed8c9dd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.190 + 100.64.57.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690788895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + be89ae70-2f74-11ee-8001-3b5fed8c9dd3 + + + diff --git a/graph/incidents_graphml/b/be8aefb0-3e56-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/b/be8aefb0-3e56-11ee-9b4e-c562a9c40af9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..677374fd07deb29bf7d56b8fc7f1b4fba780a29e --- /dev/null +++ b/graph/incidents_graphml/b/be8aefb0-3e56-11ee-9b4e-c562a9c40af9.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.167 + 100.64.18.167 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.36.31 + 100.64.36.31 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692425277 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be8aefb0-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425277 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be8aefb0-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425277 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be8aefb0-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425277 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + be8aefb0-3e56-11ee-9b4e-c562a9c40af9 + + + diff --git a/graph/incidents_graphml/b/bea329e0-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/bea329e0-2f74-11ee-8001-3b5fed8c9dd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..035987c62d63d4da85f8c76eb892945926e69166 --- /dev/null +++ b/graph/incidents_graphml/b/bea329e0-2f74-11ee-8001-3b5fed8c9dd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.190 + 100.64.57.190 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690788895 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bea329e0-2f74-11ee-8001-3b5fed8c9dd3 + + + diff --git a/graph/incidents_graphml/b/beadeed0-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/beadeed0-4220-11ed-8199-49d89c688a9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4affb06504de2634649e188855a4156d9c14681 --- /dev/null +++ b/graph/incidents_graphml/b/beadeed0-4220-11ed-8199-49d89c688a9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.34 + 100.64.87.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1664694392 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + beadeed0-4220-11ed-8199-49d89c688a9c + + + diff --git a/graph/incidents_graphml/b/beb2a9c0-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/beb2a9c0-4220-11ed-8199-49d89c688a9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0042084adfde4050dd60cccaa9dcaba87e241ea8 --- /dev/null +++ b/graph/incidents_graphml/b/beb2a9c0-4220-11ed-8199-49d89c688a9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.34 + 100.64.87.34 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664694392 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + beb2a9c0-4220-11ed-8199-49d89c688a9c + + + diff --git a/graph/incidents_graphml/b/beb79170-a060-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/b/beb79170-a060-11ee-9181-41cbe26a7b16.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1756c8daf440669a57b38209f603648a20f7381 --- /dev/null +++ b/graph/incidents_graphml/b/beb79170-a060-11ee-9181-41cbe26a7b16.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.42 + 100.64.68.42 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1703204787 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + beb79170-a060-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703204787 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + beb79170-a060-11ee-9181-41cbe26a7b16 + + + diff --git a/graph/incidents_graphml/b/beb82800-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/beb82800-4220-11ed-8199-49d89c688a9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b4327b8e0d8b0de6d22887edd9c733c0588e11d --- /dev/null +++ b/graph/incidents_graphml/b/beb82800-4220-11ed-8199-49d89c688a9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.223 + 100.64.58.223 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1664694392 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + beb82800-4220-11ed-8199-49d89c688a9c + + + diff --git a/graph/incidents_graphml/b/bec4f940-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bec4f940-4220-11ed-8199-49d89c688a9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3395e4f0c82cd7a4688a0bf2f366b3cc07d9c282 --- /dev/null +++ b/graph/incidents_graphml/b/bec4f940-4220-11ed-8199-49d89c688a9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.58.223 + 100.64.58.223 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664694392 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bec4f940-4220-11ed-8199-49d89c688a9c + + + diff --git a/graph/incidents_graphml/b/bed1b450-2b35-11ef-be20-e314b24e9951.graphml b/graph/incidents_graphml/b/bed1b450-2b35-11ef-be20-e314b24e9951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67ecf464b7b08b786e0085bd7c0acc9dfc433746 --- /dev/null +++ b/graph/incidents_graphml/b/bed1b450-2b35-11ef-be20-e314b24e9951.graphml @@ -0,0 +1,867 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.245 + 100.64.91.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.246 + 100.64.91.246 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.165 + 100.64.10.165 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.247 + 100.64.91.247 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.116 + 100.64.31.116 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.70 + 100.64.60.70 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.248 + USER-0015-2078.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.249 + 100.64.91.249 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.76 + 100.64.64.76 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.250 + 100.64.91.250 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.251 + 100.64.91.251 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.105 + 100.64.15.105 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.135 + 100.64.59.135 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.252 + 100.64.91.252 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.84.42 + 100.64.84.42 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.253 + USER-0015-2079.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.227 + 100.64.63.227 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 100.64.88.157 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.254 + 100.64.91.254 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.69 + 100.64.4.69 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + INCIDENT_LINK + 1718469530 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bed1b450-2b35-11ef-be20-e314b24e9951 + + + diff --git a/graph/incidents_graphml/b/bedadcf0-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/b/bedadcf0-be7c-11ed-9564-3d773f19984f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..551991d898ea7f3b6ee08ceacaa5634369910663 --- /dev/null +++ b/graph/incidents_graphml/b/bedadcf0-be7c-11ed-9564-3d773f19984f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.21.62 + 100.64.21.62 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678367850 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bedadcf0-be7c-11ed-9564-3d773f19984f + + + diff --git a/graph/incidents_graphml/b/bedca6e0-fe94-11ed-a08d-35e4f0a9a870.graphml b/graph/incidents_graphml/b/bedca6e0-fe94-11ed-a08d-35e4f0a9a870.graphml new file mode 100644 index 0000000000000000000000000000000000000000..540833e536aa43062acb0476cd3133d816c4b94c --- /dev/null +++ b/graph/incidents_graphml/b/bedca6e0-fe94-11ed-a08d-35e4f0a9a870.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.19.83 + 100.64.19.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685415033 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bedca6e0-fe94-11ed-a08d-35e4f0a9a870 + + + diff --git a/graph/incidents_graphml/b/bedd26e0-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/b/bedd26e0-be7c-11ed-9564-3d773f19984f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fee5c23b2433577c92083ec3b3891d9c592100e0 --- /dev/null +++ b/graph/incidents_graphml/b/bedd26e0-be7c-11ed-9564-3d773f19984f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.127 + 100.64.83.127 + ["Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678367850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bedd26e0-be7c-11ed-9564-3d773f19984f + + + diff --git a/graph/incidents_graphml/b/bee0f770-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/b/bee0f770-be7c-11ed-9564-3d773f19984f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80e26c4350e807e7382059c1db41fa04daf92013 --- /dev/null +++ b/graph/incidents_graphml/b/bee0f770-be7c-11ed-9564-3d773f19984f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.83.127 + 100.64.83.127 + ["Exploiting Host"] + 0.578125 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1678367850 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bee0f770-be7c-11ed-9564-3d773f19984f + + + diff --git a/graph/incidents_graphml/b/bee36870-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/b/bee36870-be7c-11ed-9564-3d773f19984f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d887548dee4e608a32ba7aa7dd96be04c9edc985 --- /dev/null +++ b/graph/incidents_graphml/b/bee36870-be7c-11ed-9564-3d773f19984f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.237 + 100.64.83.237 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678367850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bee36870-be7c-11ed-9564-3d773f19984f + + + diff --git a/graph/incidents_graphml/b/bee64f80-e280-11ee-bdbd-61ca27aa8970.graphml b/graph/incidents_graphml/b/bee64f80-e280-11ee-bdbd-61ca27aa8970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9574d043e1d20df1e0812a96d6592b7ce968bd3f --- /dev/null +++ b/graph/incidents_graphml/b/bee64f80-e280-11ee-bdbd-61ca27aa8970.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.207 + 100.64.56.207 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.179 + 100.64.21.179 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.230 + 100.64.14.230 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.8 + 100.64.46.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710475308 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bee64f80-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475308 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bee64f80-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475308 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bee64f80-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475308 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bee64f80-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475308 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bee64f80-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475308 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bee64f80-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475308 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bee64f80-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475308 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bee64f80-e280-11ee-bdbd-61ca27aa8970 + + + diff --git a/graph/incidents_graphml/b/bee73900-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/b/bee73900-be7c-11ed-9564-3d773f19984f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34a7e5a16fe2129caa436f62777240988797d481 --- /dev/null +++ b/graph/incidents_graphml/b/bee73900-be7c-11ed-9564-3d773f19984f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.83.237 + 100.64.83.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678367850 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bee73900-be7c-11ed-9564-3d773f19984f + + + diff --git a/graph/incidents_graphml/b/bef01390-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/bef01390-3e29-11ee-b681-89e3497f1d7e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03631310c6a2e1649e8148ecd73e24640f1fe50c --- /dev/null +++ b/graph/incidents_graphml/b/bef01390-3e29-11ee-b681-89e3497f1d7e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.122 + 100.64.15.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692405951 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bef01390-3e29-11ee-b681-89e3497f1d7e + + + diff --git a/graph/incidents_graphml/b/befc61a0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/b/befc61a0-1c3c-11ed-9dc4-eb234c0496d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d1d1004e800caeb78031c10be7c6326ab462c06 --- /dev/null +++ b/graph/incidents_graphml/b/befc61a0-1c3c-11ed-9dc4-eb234c0496d2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.38 + 100.64.78.38 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.144 + 100.64.72.144 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660528274 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + befc61a0-1c3c-11ed-9dc4-eb234c0496d2 + + + INCIDENT_LINK + 1660528274 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + befc61a0-1c3c-11ed-9dc4-eb234c0496d2 + + + diff --git a/graph/incidents_graphml/b/befe5e70-a060-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/b/befe5e70-a060-11ee-9181-41cbe26a7b16.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b836bd5c71b65560a5a115ef9c2d78f82e75bc7 --- /dev/null +++ b/graph/incidents_graphml/b/befe5e70-a060-11ee-9181-41cbe26a7b16.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.23 + USER-0015-1491.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1703204787 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + befe5e70-a060-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703204787 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + befe5e70-a060-11ee-9181-41cbe26a7b16 + + + diff --git a/graph/incidents_graphml/b/bf006740-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/bf006740-3e29-11ee-b681-89e3497f1d7e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36f9b774fc5afe3c02498a92faacaba135282c41 --- /dev/null +++ b/graph/incidents_graphml/b/bf006740-3e29-11ee-b681-89e3497f1d7e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.122 + 100.64.15.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692405951 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bf006740-3e29-11ee-b681-89e3497f1d7e + + + diff --git a/graph/incidents_graphml/b/bf0b3220-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/bf0b3220-edf0-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f209afdef8ad0c1170805e5fed2029bdd469b23 --- /dev/null +++ b/graph/incidents_graphml/b/bf0b3220-edf0-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.6 + 100.64.31.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711732874 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf0b3220-edf0-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/b/bf104870-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/b/bf104870-41dc-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..228b756030c9abdf4d95e055269ac7f10f9d0319 --- /dev/null +++ b/graph/incidents_graphml/b/bf104870-41dc-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.224 + 100.64.67.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692812684 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bf104870-41dc-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/b/bf1093e0-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/bf1093e0-3e29-11ee-b681-89e3497f1d7e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62485d43654f182716c6997da976a594e24391e0 --- /dev/null +++ b/graph/incidents_graphml/b/bf1093e0-3e29-11ee-b681-89e3497f1d7e.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.124 + 100.64.15.124 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692405951 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bf1093e0-3e29-11ee-b681-89e3497f1d7e + + + INCIDENT_LINK + 1692405951 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bf1093e0-3e29-11ee-b681-89e3497f1d7e + + + diff --git a/graph/incidents_graphml/b/bf1e6c00-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/bf1e6c00-edf0-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ad13bb14e6f587419f55fd4c9552e07370a5234 --- /dev/null +++ b/graph/incidents_graphml/b/bf1e6c00-edf0-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.6 + 100.64.31.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1711732875 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bf1e6c00-edf0-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/b/bf2102c0-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/b/bf2102c0-b6de-11ed-9d21-f346d8153a36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5eb6baaadec358860f3298ed035a54ba6cf20e99 --- /dev/null +++ b/graph/incidents_graphml/b/bf2102c0-b6de-11ed-9d21-f346d8153a36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 100.64.84.158 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1677530332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bf2102c0-b6de-11ed-9d21-f346d8153a36 + + + diff --git a/graph/incidents_graphml/b/bf229540-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/bf229540-3e29-11ee-b681-89e3497f1d7e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..526537fc771769b1a0828043c156bdf39f08042d --- /dev/null +++ b/graph/incidents_graphml/b/bf229540-3e29-11ee-b681-89e3497f1d7e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.124 + 100.64.15.124 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692405951 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bf229540-3e29-11ee-b681-89e3497f1d7e + + + diff --git a/graph/incidents_graphml/b/bf24ac40-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/b/bf24ac40-b6de-11ed-9d21-f346d8153a36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4073cc8786751240589fd00ca36e0316548c9f20 --- /dev/null +++ b/graph/incidents_graphml/b/bf24ac40-b6de-11ed-9d21-f346d8153a36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677530332 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bf24ac40-b6de-11ed-9d21-f346d8153a36 + + + diff --git a/graph/incidents_graphml/b/bf2500c0-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/b/bf2500c0-1fe1-11ee-80ac-1985e110d782.graphml new file mode 100644 index 0000000000000000000000000000000000000000..091a406513065cf5bc574a26292ba6545df6332e --- /dev/null +++ b/graph/incidents_graphml/b/bf2500c0-1fe1-11ee-80ac-1985e110d782.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.42 + 100.64.57.42 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689076493 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bf2500c0-1fe1-11ee-80ac-1985e110d782 + + + diff --git a/graph/incidents_graphml/b/bf251860-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bf251860-16e3-11ed-984f-4116df7b0d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8feb05d09f715d06c5431d29a31edfa57db74d05 --- /dev/null +++ b/graph/incidents_graphml/b/bf251860-16e3-11ed-984f-4116df7b0d24.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.236 + 100.64.80.236 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.95 + 100.64.74.95 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659940293 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bf251860-16e3-11ed-984f-4116df7b0d24 + + + INCIDENT_LINK + 1659940293 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bf251860-16e3-11ed-984f-4116df7b0d24 + + + diff --git a/graph/incidents_graphml/b/bf2ac6e0-fe94-11ed-a08d-35e4f0a9a870.graphml b/graph/incidents_graphml/b/bf2ac6e0-fe94-11ed-a08d-35e4f0a9a870.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0031596adb6497d36da40cae1312b27d175ec2b --- /dev/null +++ b/graph/incidents_graphml/b/bf2ac6e0-fe94-11ed-a08d-35e4f0a9a870.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.243 + 100.64.45.243 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685415033 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bf2ac6e0-fe94-11ed-a08d-35e4f0a9a870 + + + diff --git a/graph/incidents_graphml/b/bf2ee6c0-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/bf2ee6c0-edf0-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edf21629b29c9a7388d1417dee818c0981970332 --- /dev/null +++ b/graph/incidents_graphml/b/bf2ee6c0-edf0-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.161 + 100.64.45.161 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711732875 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bf2ee6c0-edf0-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/b/bf43cd20-fe94-11ed-a08d-35e4f0a9a870.graphml b/graph/incidents_graphml/b/bf43cd20-fe94-11ed-a08d-35e4f0a9a870.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3fdc1a3325960af7e1fe8150f8c7dcd8dcc38f5b --- /dev/null +++ b/graph/incidents_graphml/b/bf43cd20-fe94-11ed-a08d-35e4f0a9a870.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.45.243 + 100.64.45.243 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685415033 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + bf43cd20-fe94-11ed-a08d-35e4f0a9a870 + + + diff --git a/graph/incidents_graphml/b/bf4b9680-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/bf4b9680-edf0-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b91e4f2b4160c3e807ad92460b8bdcbb768a70c1 --- /dev/null +++ b/graph/incidents_graphml/b/bf4b9680-edf0-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.161 + 100.64.45.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711732875 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bf4b9680-edf0-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/b/bf5ae970-0be4-11ef-ba5f-4140e81db4cb.graphml b/graph/incidents_graphml/b/bf5ae970-0be4-11ef-ba5f-4140e81db4cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35bd354d12fab6236ed08902477fca3787498f83 --- /dev/null +++ b/graph/incidents_graphml/b/bf5ae970-0be4-11ef-ba5f-4140e81db4cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.18 + 100.64.89.18 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1715026256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bf5ae970-0be4-11ef-ba5f-4140e81db4cb + + + diff --git a/graph/incidents_graphml/b/bf765a90-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/bf765a90-3e29-11ee-b681-89e3497f1d7e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36e7efb44a342ab8e4dca79aadd384afaaa0ee25 --- /dev/null +++ b/graph/incidents_graphml/b/bf765a90-3e29-11ee-b681-89e3497f1d7e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.126 + 100.64.15.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692405952 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bf765a90-3e29-11ee-b681-89e3497f1d7e + + + diff --git a/graph/incidents_graphml/b/bf77a770-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bf77a770-4220-11ed-8199-49d89c688a9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38a33ee98f0ab1e2f8e70c696b1e6a11a636cce6 --- /dev/null +++ b/graph/incidents_graphml/b/bf77a770-4220-11ed-8199-49d89c688a9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.83.34 + 100.64.83.34 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664694393 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bf77a770-4220-11ed-8199-49d89c688a9c + + + diff --git a/graph/incidents_graphml/b/bf77c790-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/b/bf77c790-50a8-11ee-9ae0-a3d3a7298a83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30ffd83da23993029450cd675360189ec3e2b6d8 --- /dev/null +++ b/graph/incidents_graphml/b/bf77c790-50a8-11ee-9ae0-a3d3a7298a83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.101 + 100.64.27.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694439619 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bf77c790-50a8-11ee-9ae0-a3d3a7298a83 + + + diff --git a/graph/incidents_graphml/b/bf7cfea0-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bf7cfea0-4220-11ed-8199-49d89c688a9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ce46b80b7a144645185de0b08b613a99b6485bd --- /dev/null +++ b/graph/incidents_graphml/b/bf7cfea0-4220-11ed-8199-49d89c688a9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.39 + 100.64.87.39 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1664694393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bf7cfea0-4220-11ed-8199-49d89c688a9c + + + diff --git a/graph/incidents_graphml/b/bf81e0a0-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bf81e0a0-4220-11ed-8199-49d89c688a9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4cb480a9003d39e632baa2ead5e3ca8fd44ff61 --- /dev/null +++ b/graph/incidents_graphml/b/bf81e0a0-4220-11ed-8199-49d89c688a9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.87.39 + 100.64.87.39 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664694393 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bf81e0a0-4220-11ed-8199-49d89c688a9c + + + diff --git a/graph/incidents_graphml/b/bf835460-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/b/bf835460-f613-11ed-a3d6-ad85d59eee66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d606d7eb5aad227a51105dff07ab3199b57b7cbf --- /dev/null +++ b/graph/incidents_graphml/b/bf835460-f613-11ed-a3d6-ad85d59eee66.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.252 + 100.64.9.252 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.181 + HOST-14580 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.21.5 + 100.64.21.5 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1684480019 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf835460-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480019 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf835460-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480019 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf835460-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480019 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf835460-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480019 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf835460-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480019 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf835460-f613-11ed-a3d6-ad85d59eee66 + + + diff --git a/graph/incidents_graphml/b/bf8731e0-f6a1-11ee-8b23-bde5dce38992.graphml b/graph/incidents_graphml/b/bf8731e0-f6a1-11ee-8b23-bde5dce38992.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1aa28f0e4e67e5d188497b0f48a0f2c88a1f02ad --- /dev/null +++ b/graph/incidents_graphml/b/bf8731e0-f6a1-11ee-8b23-bde5dce38992.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.20 + 100.64.22.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712688505 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bf8731e0-f6a1-11ee-8b23-bde5dce38992 + + + diff --git a/graph/incidents_graphml/b/bf8c8130-3e56-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/b/bf8c8130-3e56-11ee-9b4e-c562a9c40af9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77f0d47168956cd9b569a5d0d757e7b80083e035 --- /dev/null +++ b/graph/incidents_graphml/b/bf8c8130-3e56-11ee-9b4e-c562a9c40af9.graphml @@ -0,0 +1,177 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.155 + 100.64.7.155 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692425279 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf8c8130-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425279 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf8c8130-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425279 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf8c8130-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425279 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf8c8130-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425279 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf8c8130-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425279 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf8c8130-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425279 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf8c8130-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425279 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf8c8130-3e56-11ee-9b4e-c562a9c40af9 + + + diff --git a/graph/incidents_graphml/b/bf9cf570-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/b/bf9cf570-2ebf-11ee-9131-1117bdeaaaa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d208594d422070dbe63deda7e0d8afa9d93b8160 --- /dev/null +++ b/graph/incidents_graphml/b/bf9cf570-2ebf-11ee-9131-1117bdeaaaa3.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.16 + 100.64.9.16 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.115 + 100.64.72.115 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.21.54 + 100.64.21.54 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","Meraki"] + + + HOST + 100.64.19.170 + 100.64.19.170 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.116 + 100.64.72.116 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.42 + 100.64.11.42 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.46.236 + 100.64.46.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.117 + 100.64.72.117 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711158 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bf9cf570-2ebf-11ee-9131-1117bdeaaaa3 + + + diff --git a/graph/incidents_graphml/b/bfa3fff0-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/bfa3fff0-ebef-11ec-9679-75d3d6184114.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eaceb5f9c91dc1524735910586a53e8f35136c0e --- /dev/null +++ b/graph/incidents_graphml/b/bfa3fff0-ebef-11ec-9679-75d3d6184114.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.7 + USER-0015-1829.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.255 + 100.64.73.255 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655217548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfa3fff0-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfa3fff0-ebef-11ec-9679-75d3d6184114 + + + diff --git a/graph/incidents_graphml/b/bfa7be20-22d3-11ef-b7cc-27d8681b231b.graphml b/graph/incidents_graphml/b/bfa7be20-22d3-11ef-b7cc-27d8681b231b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a5fb739bb19f6be8c252e8e4b51e8eea117275b --- /dev/null +++ b/graph/incidents_graphml/b/bfa7be20-22d3-11ef-b7cc-27d8681b231b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.199 + 100.64.48.199 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + INCIDENT_LINK + 1717547832 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfa7be20-22d3-11ef-b7cc-27d8681b231b + + + diff --git a/graph/incidents_graphml/b/bfae9000-f6a1-11ee-8b23-bde5dce38992.graphml b/graph/incidents_graphml/b/bfae9000-f6a1-11ee-8b23-bde5dce38992.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4a7b02a5d2a7cde685070aec449a6cc065fb2f5 --- /dev/null +++ b/graph/incidents_graphml/b/bfae9000-f6a1-11ee-8b23-bde5dce38992.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.22 + 100.64.22.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.23 + 100.64.22.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.154 + 100.64.19.154 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.24 + 100.64.22.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.198 + 100.64.14.198 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.22.25 + 100.64.22.25 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.26 + 100.64.22.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.122 + 100.64.18.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.27 + 100.64.22.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.28 + 100.64.22.28 + [] + 0.25 + ["Precinct"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.29 + 100.64.22.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.30 + 100.64.22.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.11.212 + 100.64.11.212 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.31 + 100.64.22.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.32 + 100.64.22.32 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.25 + 100.64.20.25 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.33 + 100.64.22.33 + [] + 0.25 + ["Precinct"] + + + HOST + 100.64.16.135 + 100.64.16.135 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + INCIDENT_LINK + 1712688506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfae9000-f6a1-11ee-8b23-bde5dce38992 + + + diff --git a/graph/incidents_graphml/b/bfb66630-294c-11ef-a020-fd333ff9534c.graphml b/graph/incidents_graphml/b/bfb66630-294c-11ef-a020-fd333ff9534c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e12a67fb55a1db0759cef4f98f0de3c9877c778 --- /dev/null +++ b/graph/incidents_graphml/b/bfb66630-294c-11ef-a020-fd333ff9534c.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.199 + 100.64.65.199 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.200 + 100.64.65.200 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.40 + 100.64.18.40 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718259508 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfb66630-294c-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259508 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfb66630-294c-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259508 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfb66630-294c-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259508 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfb66630-294c-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259508 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfb66630-294c-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259508 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfb66630-294c-11ef-a020-fd333ff9534c + + + diff --git a/graph/incidents_graphml/b/bfbaf200-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bfbaf200-4220-11ed-8199-49d89c688a9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99935b727cfc3e77c8201a5933c1dfbb9af5d026 --- /dev/null +++ b/graph/incidents_graphml/b/bfbaf200-4220-11ed-8199-49d89c688a9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.41 + 100.64.87.41 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1664694394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfbaf200-4220-11ed-8199-49d89c688a9c + + + diff --git a/graph/incidents_graphml/b/bfbb05c0-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/b/bfbb05c0-e0ed-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c29ab7a388cae56fc1e164e4b3182c0d6da60ae6 --- /dev/null +++ b/graph/incidents_graphml/b/bfbb05c0-e0ed-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.39 + 100.64.39.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710302222 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfbb05c0-e0ed-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/b/bfbe2070-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/bfbe2070-39e0-11ee-b92b-37d2cd449a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..535bf2bf1cb54911a81ab3395fd00b49d9a32b6a --- /dev/null +++ b/graph/incidents_graphml/b/bfbe2070-39e0-11ee-b92b-37d2cd449a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.31 + 100.64.4.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691934794 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfbe2070-39e0-11ee-b92b-37d2cd449a32 + + + diff --git a/graph/incidents_graphml/b/bfbf85e0-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bfbf85e0-4220-11ed-8199-49d89c688a9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36a13718a19d7d4438aeee7ecb7821ee6e1ff5da --- /dev/null +++ b/graph/incidents_graphml/b/bfbf85e0-4220-11ed-8199-49d89c688a9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.87.41 + 100.64.87.41 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664694394 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bfbf85e0-4220-11ed-8199-49d89c688a9c + + + diff --git a/graph/incidents_graphml/b/bfc09e20-1133-11ee-a919-7371bcc8a8e4.graphml b/graph/incidents_graphml/b/bfc09e20-1133-11ee-a919-7371bcc8a8e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee1b8f9d9a507e36de67ad22a07d84bfc51105d4 --- /dev/null +++ b/graph/incidents_graphml/b/bfc09e20-1133-11ee-a919-7371bcc8a8e4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.212 + 100.64.3.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687462445 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfc09e20-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfc09e20-1133-11ee-a919-7371bcc8a8e4 + + + diff --git a/graph/incidents_graphml/b/bfc88690-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bfc88690-4220-11ed-8199-49d89c688a9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9625fd1c51c4fcac2b512be3636a70ddfa564ee --- /dev/null +++ b/graph/incidents_graphml/b/bfc88690-4220-11ed-8199-49d89c688a9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.43 + 100.64.87.43 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1664694394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bfc88690-4220-11ed-8199-49d89c688a9c + + + diff --git a/graph/incidents_graphml/b/bfccf120-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bfccf120-16e3-11ed-984f-4116df7b0d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a116ea61ac0c88549058b2eb7588d201a85d7b6 --- /dev/null +++ b/graph/incidents_graphml/b/bfccf120-16e3-11ed-984f-4116df7b0d24.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.237 + 100.64.80.237 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.240 + 100.64.1.240 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659940294 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfccf120-16e3-11ed-984f-4116df7b0d24 + + + INCIDENT_LINK + 1659940294 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfccf120-16e3-11ed-984f-4116df7b0d24 + + + diff --git a/graph/incidents_graphml/b/bfcf9f30-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/b/bfcf9f30-e0ed-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6707ac5bd8e780823af81656e03afc31dce59951 --- /dev/null +++ b/graph/incidents_graphml/b/bfcf9f30-e0ed-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.39 + 100.64.39.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710302222 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + bfcf9f30-e0ed-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/b/bfd78840-1b49-11ee-80b5-4fc6a3f1abdb.graphml b/graph/incidents_graphml/b/bfd78840-1b49-11ee-80b5-4fc6a3f1abdb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da821b5d5a37717d9a556262eb61d6ffbf5dfc88 --- /dev/null +++ b/graph/incidents_graphml/b/bfd78840-1b49-11ee-80b5-4fc6a3f1abdb.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.166 + 100.64.13.166 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.167 + 100.64.13.167 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.168 + USER-0015-1201.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.169 + 100.64.13.169 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd78840-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd78840-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd78840-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd78840-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd78840-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd78840-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd78840-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd78840-1b49-11ee-80b5-4fc6a3f1abdb + + + diff --git a/graph/incidents_graphml/b/bfd7a890-1133-11ee-a919-7371bcc8a8e4.graphml b/graph/incidents_graphml/b/bfd7a890-1133-11ee-a919-7371bcc8a8e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff8de2c26b43269ce7b67b8062c5e3d230087ea1 --- /dev/null +++ b/graph/incidents_graphml/b/bfd7a890-1133-11ee-a919-7371bcc8a8e4.graphml @@ -0,0 +1,351 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.241 + 100.64.46.241 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.139 + 100.64.47.139 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.169 + 100.64.22.169 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.55 + 100.64.37.55 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.214 + 100.64.10.214 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.69 + 100.64.55.69 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.70 + 100.64.55.70 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.127 + 100.64.18.127 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + INCIDENT_LINK + 1687462445 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfd7a890-1133-11ee-a919-7371bcc8a8e4 + + + diff --git a/graph/incidents_graphml/b/bfe48090-1b49-11ee-80b5-4fc6a3f1abdb.graphml b/graph/incidents_graphml/b/bfe48090-1b49-11ee-80b5-4fc6a3f1abdb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06be25d53859f1c0e0b6c3905bfcbfb3740c9e63 --- /dev/null +++ b/graph/incidents_graphml/b/bfe48090-1b49-11ee-80b5-4fc6a3f1abdb.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.174 + 100.64.13.174 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.175 + 100.64.13.175 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfe48090-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfe48090-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfe48090-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfe48090-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfe48090-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571406 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + bfe48090-1b49-11ee-80b5-4fc6a3f1abdb + + + diff --git a/graph/incidents_graphml/b/bff2e040-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/b/bff2e040-41dc-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfdb13197036bac5c4055a1f07935b54da7b469b --- /dev/null +++ b/graph/incidents_graphml/b/bff2e040-41dc-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.67 + 100.64.17.67 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692812686 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bff2e040-41dc-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/b/bffd8510-cf6a-11ee-91bc-e1cf8103bf6f.graphml b/graph/incidents_graphml/b/bffd8510-cf6a-11ee-91bc-e1cf8103bf6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b1268f5bac056037ce132ad0b9540c793749f17d --- /dev/null +++ b/graph/incidents_graphml/b/bffd8510-cf6a-11ee-91bc-e1cf8103bf6f.graphml @@ -0,0 +1,229 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.112 + 100.64.52.112 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.37 + 100.64.23.37 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.113 + 100.64.52.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.114 + 100.64.52.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708376789 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bffd8510-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376789 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bffd8510-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376789 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bffd8510-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376789 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bffd8510-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376789 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bffd8510-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376789 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bffd8510-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376789 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bffd8510-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376789 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bffd8510-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376789 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bffd8510-cf6a-11ee-91bc-e1cf8103bf6f + + + INCIDENT_LINK + 1708376789 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + bffd8510-cf6a-11ee-91bc-e1cf8103bf6f + + + diff --git a/graph/incidents_graphml/c/c0030ce0-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c0030ce0-41dc-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e573597cffc5f7dab06ef1374f16f46075c09d5 --- /dev/null +++ b/graph/incidents_graphml/c/c0030ce0-41dc-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.67 + 100.64.17.67 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692812686 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c0030ce0-41dc-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c00c13c0-3d36-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/c/c00c13c0-3d36-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd067d269b82650583f1c7ea98adb97e0f6f9dc6 --- /dev/null +++ b/graph/incidents_graphml/c/c00c13c0-3d36-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,177 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + USER-0015-1979.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.49 + USER-0015-2063.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.46.208 + USER-0015-1982.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.50 + 100.64.91.50 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720449083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c00c13c0-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720449083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c00c13c0-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720449083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c00c13c0-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720449083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c00c13c0-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720449083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c00c13c0-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720449083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c00c13c0-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720449083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c00c13c0-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720449083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c00c13c0-3d36-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/c/c011d7c0-e560-11ee-be14-8bb84b2c14a8.graphml b/graph/incidents_graphml/c/c011d7c0-e560-11ee-be14-8bb84b2c14a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef62892f864bf4cd6bb5b7cf980b249220493f18 --- /dev/null +++ b/graph/incidents_graphml/c/c011d7c0-e560-11ee-be14-8bb84b2c14a8.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.67 + 100.64.24.67 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.14.222 + 100.64.14.222 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.17.101 + 100.64.17.101 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710791419 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c011d7c0-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791419 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c011d7c0-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791419 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c011d7c0-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791419 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c011d7c0-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791419 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c011d7c0-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791419 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c011d7c0-e560-11ee-be14-8bb84b2c14a8 + + + diff --git a/graph/incidents_graphml/c/c016a8f0-0cf7-11ee-aa7f-c3325e1e3407.graphml b/graph/incidents_graphml/c/c016a8f0-0cf7-11ee-aa7f-c3325e1e3407.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f8d5816b6ba8234ad70f22ed8845c6b31ed5966 --- /dev/null +++ b/graph/incidents_graphml/c/c016a8f0-0cf7-11ee-aa7f-c3325e1e3407.graphml @@ -0,0 +1,553 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.132 + 100.64.33.132 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.208 + 100.64.73.208 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.80 + 100.64.71.80 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.14.77 + 100.64.14.77 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.29.19 + 100.64.29.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.47.247 + 100.64.47.247 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.37.145 + 100.64.37.145 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.63 + USER-0015-1644.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.8.30 + 100.64.8.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.64.11 + 100.64.64.11 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.67 + 100.64.75.67 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.25.50 + 100.64.25.50 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.68 + 100.64.75.68 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.55.82 + 100.64.55.82 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.69 + 100.64.75.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c016a8f0-0cf7-11ee-aa7f-c3325e1e3407 + + + diff --git a/graph/incidents_graphml/c/c01803e0-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/c/c01803e0-16e3-11ed-984f-4116df7b0d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7272b17eb1d77f87a7642227655d7c2f7a60ac3 --- /dev/null +++ b/graph/incidents_graphml/c/c01803e0-16e3-11ed-984f-4116df7b0d24.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.238 + 100.64.80.238 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659940295 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01803e0-16e3-11ed-984f-4116df7b0d24 + + + INCIDENT_LINK + 1659940295 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01803e0-16e3-11ed-984f-4116df7b0d24 + + + diff --git a/graph/incidents_graphml/c/c01b5710-dfa1-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/c/c01b5710-dfa1-11ee-9120-ff7b7094ac3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1bc0d1fa0ba287cc0656e54756f1c0beac163172 --- /dev/null +++ b/graph/incidents_graphml/c/c01b5710-dfa1-11ee-9120-ff7b7094ac3d.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.224 + 100.64.36.224 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.12.236 + 100.64.12.236 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.182 + 100.64.70.182 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.183 + 100.64.70.183 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.184 + 100.64.70.184 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710159630 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01b5710-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159630 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01b5710-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159630 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01b5710-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159630 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01b5710-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159630 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01b5710-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159630 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01b5710-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159630 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01b5710-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159630 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01b5710-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159630 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01b5710-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159630 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01b5710-dfa1-11ee-9120-ff7b7094ac3d + + + diff --git a/graph/incidents_graphml/c/c01f2d80-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c01f2d80-8de5-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63df94ca0c0d7eb32b1ea59b9165ac3e6d113a3c --- /dev/null +++ b/graph/incidents_graphml/c/c01f2d80-8de5-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.112 + 100.64.64.112 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701172840 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c01f2d80-8de5-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/c02ff660-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c02ff660-8de5-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff67ab9794c1932e0ae7e0f204310ca18f6feff5 --- /dev/null +++ b/graph/incidents_graphml/c/c02ff660-8de5-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.112 + 100.64.64.112 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701172840 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c02ff660-8de5-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/c0308960-3e56-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/c/c0308960-3e56-11ee-9b4e-c562a9c40af9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f45a6706395f7846c5e4da897eb7b14685f48fb --- /dev/null +++ b/graph/incidents_graphml/c/c0308960-3e56-11ee-9b4e-c562a9c40af9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.118 + 100.64.12.118 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1692425280 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0308960-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425280 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0308960-3e56-11ee-9b4e-c562a9c40af9 + + + diff --git a/graph/incidents_graphml/c/c032bc70-0cf7-11ee-aa7f-c3325e1e3407.graphml b/graph/incidents_graphml/c/c032bc70-0cf7-11ee-aa7f-c3325e1e3407.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04de890b27ba2365327e979f41ca5c00f7cf854e --- /dev/null +++ b/graph/incidents_graphml/c/c032bc70-0cf7-11ee-aa7f-c3325e1e3407.graphml @@ -0,0 +1,279 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.70 + 100.64.75.70 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.51 + 100.64.1.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.172 + 100.64.72.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.71 + 100.64.75.71 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.72 + 100.64.75.72 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.65.32 + 100.64.65.32 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.77 + 100.64.72.77 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + INCIDENT_LINK + 1686996871 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c032bc70-0cf7-11ee-aa7f-c3325e1e3407 + + + diff --git a/graph/incidents_graphml/c/c0430900-18e9-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/c/c0430900-18e9-11ef-94b0-d3858c4ed3ac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8216aa19aee2e43fd12f55e998b478e7c5108a58 --- /dev/null +++ b/graph/incidents_graphml/c/c0430900-18e9-11ef-94b0-d3858c4ed3ac.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.248 + 100.64.17.248 + ["Exploiting Host","Exploiting Target"] + 0.859375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.238.61 + 172.30.238.61 + ["Exploiting Target","Exploiting Host"] + 0.859375 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1716457770 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0430900-18e9-11ef-94b0-d3858c4ed3ac + + + INCIDENT_LINK + 1716457770 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0430900-18e9-11ef-94b0-d3858c4ed3ac + + + diff --git a/graph/incidents_graphml/c/c05130d0-4ea9-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/c/c05130d0-4ea9-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0bb22b6431c87c952e3d250e74f668dc75211875 --- /dev/null +++ b/graph/incidents_graphml/c/c05130d0-4ea9-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694220147 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c05130d0-4ea9-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/c/c061cf20-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/c/c061cf20-21fe-11ef-a065-0d11f2930c39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abc1c73d4e6e4970c29d4f38b2ac8d4d5d7c73bd --- /dev/null +++ b/graph/incidents_graphml/c/c061cf20-21fe-11ef-a065-0d11f2930c39.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.67 + 100.64.24.67 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717456350 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c061cf20-21fe-11ef-a065-0d11f2930c39 + + + diff --git a/graph/incidents_graphml/c/c0648060-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c0648060-789b-11ee-8d62-1fa49ad9521f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f28c719b39c68614428cfc532efe101e53b96d2 --- /dev/null +++ b/graph/incidents_graphml/c/c0648060-789b-11ee-8d62-1fa49ad9521f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.140 + 100.64.30.140 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698832083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0648060-789b-11ee-8d62-1fa49ad9521f + + + diff --git a/graph/incidents_graphml/c/c07122f0-0e2a-11ef-801a-2fb46581ffa8.graphml b/graph/incidents_graphml/c/c07122f0-0e2a-11ef-801a-2fb46581ffa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..faa91271881f5ec257d335fcd8dd03b4ab761727 --- /dev/null +++ b/graph/incidents_graphml/c/c07122f0-0e2a-11ef-801a-2fb46581ffa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.250 + 100.64.14.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715276225 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c07122f0-0e2a-11ef-801a-2fb46581ffa8 + + + diff --git a/graph/incidents_graphml/c/c0753010-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/c/c0753010-21fe-11ef-a065-0d11f2930c39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83c50986afb04047e7603542e1478b4f526e27f5 --- /dev/null +++ b/graph/incidents_graphml/c/c0753010-21fe-11ef-a065-0d11f2930c39.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.67 + 100.64.24.67 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717456350 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c0753010-21fe-11ef-a065-0d11f2930c39 + + + diff --git a/graph/incidents_graphml/c/c0787d90-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c0787d90-789b-11ee-8d62-1fa49ad9521f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb315474d94e3a2e3cc6a382545f8f0ab05fd995 --- /dev/null +++ b/graph/incidents_graphml/c/c0787d90-789b-11ee-8d62-1fa49ad9521f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.140 + 100.64.30.140 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698832084 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c0787d90-789b-11ee-8d62-1fa49ad9521f + + + diff --git a/graph/incidents_graphml/c/c07a2a20-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/c/c07a2a20-b6de-11ed-9d21-f346d8153a36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcf0c54bf081795565ca632f4ae4937548192580 --- /dev/null +++ b/graph/incidents_graphml/c/c07a2a20-b6de-11ed-9d21-f346d8153a36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.2 + 100.64.17.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1984.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1677530334 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c07a2a20-b6de-11ed-9d21-f346d8153a36 + + + diff --git a/graph/incidents_graphml/c/c07b80a0-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/c/c07b80a0-16e3-11ed-984f-4116df7b0d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..617a39c543dc21c337721c1b9c58ef058a5eb3ec --- /dev/null +++ b/graph/incidents_graphml/c/c07b80a0-16e3-11ed-984f-4116df7b0d24.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.63 + 100.64.72.63 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.39 + 100.64.1.39 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659940296 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c07b80a0-16e3-11ed-984f-4116df7b0d24 + + + INCIDENT_LINK + 1659940296 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c07b80a0-16e3-11ed-984f-4116df7b0d24 + + + diff --git a/graph/incidents_graphml/c/c07dd3a0-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/c/c07dd3a0-b6de-11ed-9d21-f346d8153a36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e2f8d1d4da8b6626fb0a2a6995f235d2360ea0a --- /dev/null +++ b/graph/incidents_graphml/c/c07dd3a0-b6de-11ed-9d21-f346d8153a36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.17.2 + 100.64.17.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677530334 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c07dd3a0-b6de-11ed-9d21-f346d8153a36 + + + diff --git a/graph/incidents_graphml/c/c083a9b0-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/c/c083a9b0-2f74-11ee-8001-3b5fed8c9dd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24f85117576f7417fca5fc4b736897bfa3f04e6f --- /dev/null +++ b/graph/incidents_graphml/c/c083a9b0-2f74-11ee-8001-3b5fed8c9dd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.192 + 100.64.57.192 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690788898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c083a9b0-2f74-11ee-8001-3b5fed8c9dd3 + + + diff --git a/graph/incidents_graphml/c/c084fb50-7135-11ee-bce1-87535eed5229.graphml b/graph/incidents_graphml/c/c084fb50-7135-11ee-bce1-87535eed5229.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00a13cc046e98a6aab26839f79158046fa221d87 --- /dev/null +++ b/graph/incidents_graphml/c/c084fb50-7135-11ee-bce1-87535eed5229.graphml @@ -0,0 +1,475 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.149 + 100.64.45.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.24 + 100.64.24.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.191 + 100.64.27.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.254 + 100.64.48.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.152 + 100.64.8.152 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.104 + 100.64.64.104 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.197 + 100.64.7.197 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.105 + 100.64.64.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.163 + 100.64.4.163 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.153 + 100.64.8.153 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.41 + 100.64.40.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.106 + 100.64.64.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + INCIDENT_LINK + 1698018617 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c084fb50-7135-11ee-bce1-87535eed5229 + + + diff --git a/graph/incidents_graphml/c/c0876bb0-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/c0876bb0-4ceb-11ee-b223-133fe64c82b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dca3f184ab4ad039e3d20f4dcaee9e2d898d69fa --- /dev/null +++ b/graph/incidents_graphml/c/c0876bb0-4ceb-11ee-b223-133fe64c82b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694028592 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0876bb0-4ceb-11ee-b223-133fe64c82b5 + + + diff --git a/graph/incidents_graphml/c/c08c4c10-0e2a-11ef-801a-2fb46581ffa8.graphml b/graph/incidents_graphml/c/c08c4c10-0e2a-11ef-801a-2fb46581ffa8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..436bd10184f562afdbf8a92594a208c85c707d90 --- /dev/null +++ b/graph/incidents_graphml/c/c08c4c10-0e2a-11ef-801a-2fb46581ffa8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.230 + 100.64.41.230 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715276225 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c08c4c10-0e2a-11ef-801a-2fb46581ffa8 + + + diff --git a/graph/incidents_graphml/c/c08d71f0-311a-11ee-87a2-613e036775fd.graphml b/graph/incidents_graphml/c/c08d71f0-311a-11ee-87a2-613e036775fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26a12db180a4a43e5ccdedeef7fee87ff659af57 --- /dev/null +++ b/graph/incidents_graphml/c/c08d71f0-311a-11ee-87a2-613e036775fd.graphml @@ -0,0 +1,811 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.79 + 100.64.58.79 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.56 + USER-0015-1428.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.167 + 100.64.54.167 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.50 + 100.64.58.50 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.51 + 100.64.58.51 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.52 + 100.64.58.52 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.80 + 100.64.58.80 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.247 + 100.64.23.247 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.81 + 100.64.58.81 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.82 + 100.64.58.82 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.83 + 100.64.58.83 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.227 + USER-0015-1425.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.84 + 100.64.58.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.85 + 100.64.58.85 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.81 + 100.64.9.81 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.10 + 100.64.41.10 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970146 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c08d71f0-311a-11ee-87a2-613e036775fd + + + diff --git a/graph/incidents_graphml/c/c0977140-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/c0977140-4ceb-11ee-b223-133fe64c82b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a59fa3805687af445b0bd7a982996e7b37e6adb0 --- /dev/null +++ b/graph/incidents_graphml/c/c0977140-4ceb-11ee-b223-133fe64c82b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694028592 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c0977140-4ceb-11ee-b223-133fe64c82b5 + + + diff --git a/graph/incidents_graphml/c/c09babd0-28a0-11ee-a420-712e71e90fc3.graphml b/graph/incidents_graphml/c/c09babd0-28a0-11ee-a420-712e71e90fc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b1e547bb42f9e88d2d3623da3fd5bd9e88c014b2 --- /dev/null +++ b/graph/incidents_graphml/c/c09babd0-28a0-11ee-a420-712e71e90fc3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.84 + 100.64.12.84 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690038138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c09babd0-28a0-11ee-a420-712e71e90fc3 + + + diff --git a/graph/incidents_graphml/c/c09c6230-2b35-11ef-be20-e314b24e9951.graphml b/graph/incidents_graphml/c/c09c6230-2b35-11ef-be20-e314b24e9951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58e14f2ff4a28b67b2a1f3a44e9d0e9b9dd46deb --- /dev/null +++ b/graph/incidents_graphml/c/c09c6230-2b35-11ef-be20-e314b24e9951.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.98 + 100.64.87.98 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718469533 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c09c6230-2b35-11ef-be20-e314b24e9951 + + + diff --git a/graph/incidents_graphml/c/c0a1b890-2dd6-11ef-a033-7190c885d3e4.graphml b/graph/incidents_graphml/c/c0a1b890-2dd6-11ef-a033-7190c885d3e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..141a5a7189b6dc248d73c2455988fdff1a350e58 --- /dev/null +++ b/graph/incidents_graphml/c/c0a1b890-2dd6-11ef-a033-7190c885d3e4.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.112 + 100.64.20.112 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.88 + 100.64.65.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718758585 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0a1b890-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0a1b890-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0a1b890-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0a1b890-2dd6-11ef-a033-7190c885d3e4 + + + diff --git a/graph/incidents_graphml/c/c0a41ba0-1007-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/c/c0a41ba0-1007-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..01ad19aa88f2baaacea5fc57b61251ce8e72e209 --- /dev/null +++ b/graph/incidents_graphml/c/c0a41ba0-1007-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.82 + 100.64.66.82 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687333597 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c0a41ba0-1007-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/c/c0aa1100-4dbe-11ee-b251-912537db6da9.graphml b/graph/incidents_graphml/c/c0aa1100-4dbe-11ee-b251-912537db6da9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..779f7700fa4b63dcbf60cc4ad7d101b64dc98a09 --- /dev/null +++ b/graph/incidents_graphml/c/c0aa1100-4dbe-11ee-b251-912537db6da9.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.33.70 + 100.64.33.70 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1694119216 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0aa1100-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119216 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0aa1100-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119216 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0aa1100-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119216 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0aa1100-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119216 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0aa1100-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119216 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0aa1100-4dbe-11ee-b251-912537db6da9 + + + diff --git a/graph/incidents_graphml/c/c0b50e20-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/c0b50e20-1c3c-11ed-9dc4-eb234c0496d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f875f3a211df7a36a89832430acc5954a1cb4a50 --- /dev/null +++ b/graph/incidents_graphml/c/c0b50e20-1c3c-11ed-9dc4-eb234c0496d2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.39 + 100.64.78.39 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.179 + 100.64.71.179 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660528277 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0b50e20-1c3c-11ed-9dc4-eb234c0496d2 + + + INCIDENT_LINK + 1660528277 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0b50e20-1c3c-11ed-9dc4-eb234c0496d2 + + + diff --git a/graph/incidents_graphml/c/c0ba7e70-28a0-11ee-a420-712e71e90fc3.graphml b/graph/incidents_graphml/c/c0ba7e70-28a0-11ee-a420-712e71e90fc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5500d408c6b67976682d76fee149dc9ef2ced242 --- /dev/null +++ b/graph/incidents_graphml/c/c0ba7e70-28a0-11ee-a420-712e71e90fc3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.84 + 100.64.12.84 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690038139 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c0ba7e70-28a0-11ee-a420-712e71e90fc3 + + + diff --git a/graph/incidents_graphml/c/c0c34a50-2dd6-11ef-a033-7190c885d3e4.graphml b/graph/incidents_graphml/c/c0c34a50-2dd6-11ef-a033-7190c885d3e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b88f2ab9f973b98a81ffa6558f26de92276d6756 --- /dev/null +++ b/graph/incidents_graphml/c/c0c34a50-2dd6-11ef-a033-7190c885d3e4.graphml @@ -0,0 +1,301 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.90 + 100.64.65.90 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.91 + 100.64.65.91 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.102 + 100.64.20.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.29 + 100.64.26.29 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.92 + 100.64.65.92 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.93 + 100.64.65.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c34a50-2dd6-11ef-a033-7190c885d3e4 + + + diff --git a/graph/incidents_graphml/c/c0c72420-4ea9-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/c/c0c72420-4ea9-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5d960889b8f0a93311dc355945de870d59eee42 --- /dev/null +++ b/graph/incidents_graphml/c/c0c72420-4ea9-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.30 + 100.64.59.30 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694220148 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0c72420-4ea9-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/c/c0caaf60-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c0caaf60-57e5-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..525ba6b7127641bd9024b77e4e162456ecc4ca8b --- /dev/null +++ b/graph/incidents_graphml/c/c0caaf60-57e5-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.65 + 100.64.44.65 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695235478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0caaf60-57e5-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/c/c0d328d0-2dd6-11ef-a033-7190c885d3e4.graphml b/graph/incidents_graphml/c/c0d328d0-2dd6-11ef-a033-7190c885d3e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b4fa3879279b67425cd6f8c10c103c7efabf756 --- /dev/null +++ b/graph/incidents_graphml/c/c0d328d0-2dd6-11ef-a033-7190c885d3e4.graphml @@ -0,0 +1,473 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.98 + USER-0015-1465.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.131 + 100.64.46.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.93 + 100.64.23.93 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.60 + 100.64.35.60 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.65 + 100.64.8.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.24 + 100.64.46.24 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.97 + 100.64.7.97 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.99 + 100.64.65.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.180 + 100.64.43.180 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.100 + 100.64.65.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.6 + 100.64.49.6 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758585 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0d328d0-2dd6-11ef-a033-7190c885d3e4 + + + diff --git a/graph/incidents_graphml/c/c0d44380-4ea9-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/c/c0d44380-4ea9-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e5a859eebe9c7cd197b2f001fc3c1da71a430be --- /dev/null +++ b/graph/incidents_graphml/c/c0d44380-4ea9-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.30 + 100.64.59.30 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694220148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c0d44380-4ea9-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/c/c0d77c50-28a0-11ee-a420-712e71e90fc3.graphml b/graph/incidents_graphml/c/c0d77c50-28a0-11ee-a420-712e71e90fc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c929ae679e58d23cfdfcbdfaef7cf068696ba2b --- /dev/null +++ b/graph/incidents_graphml/c/c0d77c50-28a0-11ee-a420-712e71e90fc3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.232 + USER-0015-1435.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690038139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0d77c50-28a0-11ee-a420-712e71e90fc3 + + + diff --git a/graph/incidents_graphml/c/c0d92e50-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c0d92e50-57e5-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e9e6736dcd6e60bbd35c922a784ed95792f540b --- /dev/null +++ b/graph/incidents_graphml/c/c0d92e50-57e5-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.65 + 100.64.44.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695235479 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c0d92e50-57e5-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/c/c0da2e80-2b35-11ef-be20-e314b24e9951.graphml b/graph/incidents_graphml/c/c0da2e80-2b35-11ef-be20-e314b24e9951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7fcf0a3ae7267df2b260519524ded88927d1d31 --- /dev/null +++ b/graph/incidents_graphml/c/c0da2e80-2b35-11ef-be20-e314b24e9951.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.46.208 + 172.16.46.208 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.234 + USER-0015-2080.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718469534 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c0da2e80-2b35-11ef-be20-e314b24e9951 + + + diff --git a/graph/incidents_graphml/c/c0e09ba0-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c0e09ba0-41dc-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df50c24b95145c13286342828482a9ebda16cfc8 --- /dev/null +++ b/graph/incidents_graphml/c/c0e09ba0-41dc-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.88 + 100.64.64.88 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692812688 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0e09ba0-41dc-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c0ed9250-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c0ed9250-e0ed-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d820e2ee19469e97271cf6bc2052e69c63f1ccd6 --- /dev/null +++ b/graph/incidents_graphml/c/c0ed9250-e0ed-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.43 + 100.64.39.43 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710302224 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0ed9250-e0ed-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/c/c0ee86c0-28a0-11ee-a420-712e71e90fc3.graphml b/graph/incidents_graphml/c/c0ee86c0-28a0-11ee-a420-712e71e90fc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99e95ea3e9135cb2c98e79db92c7ca8e94c34160 --- /dev/null +++ b/graph/incidents_graphml/c/c0ee86c0-28a0-11ee-a420-712e71e90fc3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.232 + USER-0015-1435.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690038139 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c0ee86c0-28a0-11ee-a420-712e71e90fc3 + + + diff --git a/graph/incidents_graphml/c/c0f13d70-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c0f13d70-41dc-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d022bc16e58de612175b19df215288da0238a621 --- /dev/null +++ b/graph/incidents_graphml/c/c0f13d70-41dc-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.88 + 100.64.64.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692812688 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c0f13d70-41dc-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c0fe35c0-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c0fe35c0-41dc-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4299775b29eebb8a48c3f3eb2ab386044c40da4f --- /dev/null +++ b/graph/incidents_graphml/c/c0fe35c0-41dc-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.97 + 100.64.42.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692812688 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c0fe35c0-41dc-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c107d110-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c107d110-e0ed-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e34772250ffac278d1fd3bedab15ceb170408f3c --- /dev/null +++ b/graph/incidents_graphml/c/c107d110-e0ed-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.43 + 100.64.39.43 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710302224 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c107d110-e0ed-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/c/c10dc620-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c10dc620-41dc-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03196e72e8ff47f3a732b9780a967745357236ea --- /dev/null +++ b/graph/incidents_graphml/c/c10dc620-41dc-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.97 + 100.64.42.97 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692812688 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c10dc620-41dc-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c1100200-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/c/c1100200-210c-11ee-ab17-9db2be59825a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a7e8007aa9aaf39b43f9453bfd376911dd82fd6 --- /dev/null +++ b/graph/incidents_graphml/c/c1100200-210c-11ee-ab17-9db2be59825a.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.48 + 100.64.22.48 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.49 + 100.64.22.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.50 + 100.64.22.50 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.51 + 100.64.22.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.52 + 100.64.22.52 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.53 + 100.64.22.53 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.54 + 100.64.22.54 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689204915 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1100200-210c-11ee-ab17-9db2be59825a + + + diff --git a/graph/incidents_graphml/c/c110e440-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/c/c110e440-4ede-11ee-a8d5-451ce28ad892.graphml new file mode 100644 index 0000000000000000000000000000000000000000..250145c0f0b387dd8cb1fd5b90fb343b0a56db21 --- /dev/null +++ b/graph/incidents_graphml/c/c110e440-4ede-11ee-a8d5-451ce28ad892.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.178 + USER-0015-2123.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1694242912 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c110e440-4ede-11ee-a8d5-451ce28ad892 + + + diff --git a/graph/incidents_graphml/c/c11235e0-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/c/c11235e0-6c00-11ee-9973-9b86183b2cfc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c0c770dcf099ae95c6139377ea4f2e0fe5bc85e --- /dev/null +++ b/graph/incidents_graphml/c/c11235e0-6c00-11ee-9973-9b86183b2cfc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.66.188 + 100.64.66.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697446099 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c11235e0-6c00-11ee-9973-9b86183b2cfc + + + diff --git a/graph/incidents_graphml/c/c1134cc0-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c1134cc0-0e89-11ee-9188-256b81e0b008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e88e36675ffef194a4a2a50330191647e890c368 --- /dev/null +++ b/graph/incidents_graphml/c/c1134cc0-0e89-11ee-9188-256b81e0b008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.182 + 100.64.38.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687169530 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c1134cc0-0e89-11ee-9188-256b81e0b008 + + + diff --git a/graph/incidents_graphml/c/c118e570-032d-11ee-bd4a-8bf288ff3594.graphml b/graph/incidents_graphml/c/c118e570-032d-11ee-bd4a-8bf288ff3594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f883e177d7b815b57b8bdeae1c158877d411f23 --- /dev/null +++ b/graph/incidents_graphml/c/c118e570-032d-11ee-bd4a-8bf288ff3594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.51 + HOST-14856 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.75.254 + 100.64.75.254 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685920554 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c118e570-032d-11ee-bd4a-8bf288ff3594 + + + diff --git a/graph/incidents_graphml/c/c11a62a0-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/c/c11a62a0-5bee-11ee-82a0-9da780b0dcc4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0047dda3b64c5e45563955262d4efeae42f434d --- /dev/null +++ b/graph/incidents_graphml/c/c11a62a0-5bee-11ee-82a0-9da780b0dcc4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.227 + 100.64.22.227 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695679149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c11a62a0-5bee-11ee-82a0-9da780b0dcc4 + + + diff --git a/graph/incidents_graphml/c/c12381e0-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/c/c12381e0-4ede-11ee-a8d5-451ce28ad892.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16313eb0f25998e680433b20c38936cafcf526ed --- /dev/null +++ b/graph/incidents_graphml/c/c12381e0-4ede-11ee-a8d5-451ce28ad892.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.94.178 + USER-0015-2123.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694242912 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c12381e0-4ede-11ee-a8d5-451ce28ad892 + + + diff --git a/graph/incidents_graphml/c/c12a4120-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/c/c12a4120-5bee-11ee-82a0-9da780b0dcc4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e04d2383f190fc3c2e586870bcce4b2aebb70914 --- /dev/null +++ b/graph/incidents_graphml/c/c12a4120-5bee-11ee-82a0-9da780b0dcc4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.227 + 100.64.22.227 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695679149 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c12a4120-5bee-11ee-82a0-9da780b0dcc4 + + + diff --git a/graph/incidents_graphml/c/c12cef40-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c12cef40-0e89-11ee-9188-256b81e0b008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3378e76d998c1da30a4fabfb1c2c95772b758564 --- /dev/null +++ b/graph/incidents_graphml/c/c12cef40-0e89-11ee-9188-256b81e0b008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.184 + USER-0015-1319.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687169531 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c12cef40-0e89-11ee-9188-256b81e0b008 + + + diff --git a/graph/incidents_graphml/c/c1356450-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/c/c1356450-210c-11ee-ab17-9db2be59825a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..066093d820cf10898cefc5829a2d18c1c0b72b04 --- /dev/null +++ b/graph/incidents_graphml/c/c1356450-210c-11ee-ab17-9db2be59825a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.48 + 100.64.22.48 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689204916 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c1356450-210c-11ee-ab17-9db2be59825a + + + diff --git a/graph/incidents_graphml/c/c13f1ea0-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/c/c13f1ea0-81bf-11ee-967b-47c68907a0bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66a90547936fc71bdea03b0f81accef03017715b --- /dev/null +++ b/graph/incidents_graphml/c/c13f1ea0-81bf-11ee-967b-47c68907a0bd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1699837107 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c13f1ea0-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699837107 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c13f1ea0-81bf-11ee-967b-47c68907a0bd + + + diff --git a/graph/incidents_graphml/c/c1402370-3901-11ed-a60c-6b361c078d45.graphml b/graph/incidents_graphml/c/c1402370-3901-11ed-a60c-6b361c078d45.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a747224247d02c2f09dc46510fbf9680d25b23a5 --- /dev/null +++ b/graph/incidents_graphml/c/c1402370-3901-11ed-a60c-6b361c078d45.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.4.247 + 100.64.4.247 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663691521 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c1402370-3901-11ed-a60c-6b361c078d45 + + + diff --git a/graph/incidents_graphml/c/c140f070-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/c/c140f070-0010-11ef-83c1-e54678fd0000.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be64127d43c3d16de2427ecaef8b8c7e2531bc91 --- /dev/null +++ b/graph/incidents_graphml/c/c140f070-0010-11ef-83c1-e54678fd0000.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Okta","PAN NGFW"] + + + HOST + 100.64.69.169 + 100.64.69.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713725743 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c140f070-0010-11ef-83c1-e54678fd0000 + + + diff --git a/graph/incidents_graphml/c/c145dfb0-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c145dfb0-789b-11ee-8d62-1fa49ad9521f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1da4a5d93f6b8be79f7439d64d7baf3c80f5f232 --- /dev/null +++ b/graph/incidents_graphml/c/c145dfb0-789b-11ee-8d62-1fa49ad9521f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.142 + 100.64.30.142 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698832085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c145dfb0-789b-11ee-8d62-1fa49ad9521f + + + diff --git a/graph/incidents_graphml/c/c147ece0-4ea9-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/c/c147ece0-4ea9-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e25fc347924b371b4859560a48e747654705e50a --- /dev/null +++ b/graph/incidents_graphml/c/c147ece0-4ea9-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.138 + 100.64.36.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694220149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c147ece0-4ea9-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/c/c14e5490-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/c/c14e5490-ebef-11ec-9679-75d3d6184114.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95133e0a0fc8fbfd4e4e25948177fd29d628bcdc --- /dev/null +++ b/graph/incidents_graphml/c/c14e5490-ebef-11ec-9679-75d3d6184114.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.84.101 + 192.168.84.101 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.166 + 100.64.70.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.80.8 + 100.64.80.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.80.9 + 100.64.80.9 + [] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655217551 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c14e5490-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217551 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c14e5490-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217551 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c14e5490-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217551 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c14e5490-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217551 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c14e5490-ebef-11ec-9679-75d3d6184114 + + + INCIDENT_LINK + 1655217551 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c14e5490-ebef-11ec-9679-75d3d6184114 + + + diff --git a/graph/incidents_graphml/c/c14e6ee0-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c14e6ee0-24b8-11ef-9f46-91603b00c012.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3772819c5053882973b1fd9cc27bb3916020533d --- /dev/null +++ b/graph/incidents_graphml/c/c14e6ee0-24b8-11ef-9f46-91603b00c012.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.242 + 100.64.22.242 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1717756140 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c14e6ee0-24b8-11ef-9f46-91603b00c012 + + + diff --git a/graph/incidents_graphml/c/c1572f10-3e56-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/c/c1572f10-3e56-11ee-9b4e-c562a9c40af9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f989421ce660fb5b4c34f328e4967e6d4255fff3 --- /dev/null +++ b/graph/incidents_graphml/c/c1572f10-3e56-11ee-9b4e-c562a9c40af9.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.190 + 100.64.27.190 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.58.41 + 100.64.58.41 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.10.103 + 100.64.10.103 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.69.134 + 100.64.69.134 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.135 + 100.64.69.135 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.136 + 100.64.69.136 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425282 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1572f10-3e56-11ee-9b4e-c562a9c40af9 + + + diff --git a/graph/incidents_graphml/c/c1591990-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c1591990-789b-11ee-8d62-1fa49ad9521f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45cdcacd17a180b39525d2dbead5b79642da86a9 --- /dev/null +++ b/graph/incidents_graphml/c/c1591990-789b-11ee-8d62-1fa49ad9521f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.142 + 100.64.30.142 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698832085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c1591990-789b-11ee-8d62-1fa49ad9521f + + + diff --git a/graph/incidents_graphml/c/c1598180-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/c/c1598180-0010-11ef-83c1-e54678fd0000.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3c9a4d6e7ca0b6f2da727a702d5801b70dab12a --- /dev/null +++ b/graph/incidents_graphml/c/c1598180-0010-11ef-83c1-e54678fd0000.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.184 + 100.64.51.184 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1713725743 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1598180-0010-11ef-83c1-e54678fd0000 + + + diff --git a/graph/incidents_graphml/c/c15dc740-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/c/c15dc740-0010-11ef-83c1-e54678fd0000.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0f6b2adff359e035949ac59f0da80e0b8d899bf --- /dev/null +++ b/graph/incidents_graphml/c/c15dc740-0010-11ef-83c1-e54678fd0000.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.51.184 + 100.64.51.184 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713725743 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c15dc740-0010-11ef-83c1-e54678fd0000 + + + diff --git a/graph/incidents_graphml/c/c1665a30-1007-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/c/c1665a30-1007-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d059dd4641e380ffa4a14230a9a0b7adb6ce67f1 --- /dev/null +++ b/graph/incidents_graphml/c/c1665a30-1007-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.84 + 100.64.66.84 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687333599 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1665a30-1007-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/c/c16925f0-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c16925f0-fe17-11ed-b81a-6328c43e92e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08cc3fd353262d0d97811d857405d3d0ad7dd4f8 --- /dev/null +++ b/graph/incidents_graphml/c/c16925f0-fe17-11ed-b81a-6328c43e92e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.119 + 100.64.27.119 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685361350 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c16925f0-fe17-11ed-b81a-6328c43e92e7 + + + diff --git a/graph/incidents_graphml/c/c16aa5c0-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c16aa5c0-789b-11ee-8d62-1fa49ad9521f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9816da6077284ce928fb4ff4e4e25b0a6f7d014a --- /dev/null +++ b/graph/incidents_graphml/c/c16aa5c0-789b-11ee-8d62-1fa49ad9521f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.142 + 100.64.30.142 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698832085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c16aa5c0-789b-11ee-8d62-1fa49ad9521f + + + diff --git a/graph/incidents_graphml/c/c17271a0-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c17271a0-24b8-11ef-9f46-91603b00c012.graphml new file mode 100644 index 0000000000000000000000000000000000000000..140f3fd0efe28db07ab04b6556b94e4adfd7deb9 --- /dev/null +++ b/graph/incidents_graphml/c/c17271a0-24b8-11ef-9f46-91603b00c012.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.6 + 100.64.49.6 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717756141 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17271a0-24b8-11ef-9f46-91603b00c012 + + + diff --git a/graph/incidents_graphml/c/c174ca40-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c174ca40-8454-11ee-ad04-df7d06c31c2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43b9d01c28875ec729353420a7d96c485a30cb45 --- /dev/null +++ b/graph/incidents_graphml/c/c174ca40-8454-11ee-ad04-df7d06c31c2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.208 + 100.64.10.208 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700121005 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c174ca40-8454-11ee-ad04-df7d06c31c2e + + + diff --git a/graph/incidents_graphml/c/c1780420-3936-11ef-a411-6df7c82319e6.graphml b/graph/incidents_graphml/c/c1780420-3936-11ef-a411-6df7c82319e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0071845253f6a919ef5e8c32b513fb0ea275011b --- /dev/null +++ b/graph/incidents_graphml/c/c1780420-3936-11ef-a411-6df7c82319e6.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.18 + 100.64.6.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.225 + 100.64.4.225 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720009280 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1780420-3936-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009280 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1780420-3936-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009280 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1780420-3936-11ef-a411-6df7c82319e6 + + + INCIDENT_LINK + 1720009280 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1780420-3936-11ef-a411-6df7c82319e6 + + + diff --git a/graph/incidents_graphml/c/c17a3f50-032d-11ee-bd4a-8bf288ff3594.graphml b/graph/incidents_graphml/c/c17a3f50-032d-11ee-bd4a-8bf288ff3594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66e375016fedebae78757d933f6fbe0d58b83b7f --- /dev/null +++ b/graph/incidents_graphml/c/c17a3f50-032d-11ee-bd4a-8bf288ff3594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.99 + 100.64.11.99 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.71.116 + 100.64.71.116 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685920555 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17a3f50-032d-11ee-bd4a-8bf288ff3594 + + + diff --git a/graph/incidents_graphml/c/c17db890-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c17db890-789b-11ee-8d62-1fa49ad9521f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..791dd93ab60034d41b76a2dd395dcab3558b1200 --- /dev/null +++ b/graph/incidents_graphml/c/c17db890-789b-11ee-8d62-1fa49ad9521f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.142 + 100.64.30.142 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698832085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c17db890-789b-11ee-8d62-1fa49ad9521f + + + diff --git a/graph/incidents_graphml/c/c17ea250-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/c/c17ea250-bcf3-11ed-9421-6db30872eff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00c15dbd54a038de73c8be8759f66a554c8e4a9a --- /dev/null +++ b/graph/incidents_graphml/c/c17ea250-bcf3-11ed-9421-6db30872eff3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.36 + 100.64.86.36 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1678199062 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c17ea250-bcf3-11ed-9421-6db30872eff3 + + + diff --git a/graph/incidents_graphml/c/c17ec990-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/c17ec990-0da9-11ee-812a-a702327978d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6a77ddf120a42132ff46cc39507c31a953695ee --- /dev/null +++ b/graph/incidents_graphml/c/c17ec990-0da9-11ee-812a-a702327978d7.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.106 + 100.64.25.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.107 + 100.64.25.107 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.108 + 100.64.25.108 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.109 + 100.64.25.109 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.110 + 100.64.25.110 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.111 + 100.64.25.111 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687073324 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17ec990-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073324 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17ec990-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073324 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17ec990-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073324 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17ec990-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073324 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17ec990-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073324 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17ec990-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073324 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17ec990-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073324 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17ec990-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073324 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17ec990-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073324 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17ec990-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073324 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17ec990-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073324 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c17ec990-0da9-11ee-812a-a702327978d7 + + + diff --git a/graph/incidents_graphml/c/c181fdb0-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/c/c181fdb0-bcf3-11ed-9421-6db30872eff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4d7a7b37a4edec1d6e869645ce4fff263caec0a --- /dev/null +++ b/graph/incidents_graphml/c/c181fdb0-bcf3-11ed-9421-6db30872eff3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.86.36 + 100.64.86.36 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678199062 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c181fdb0-bcf3-11ed-9421-6db30872eff3 + + + diff --git a/graph/incidents_graphml/c/c183f160-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/c/c183f160-4ede-11ee-a8d5-451ce28ad892.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f545d4e18c90bbdf4a341f8d40271dc8e0f6f05c --- /dev/null +++ b/graph/incidents_graphml/c/c183f160-4ede-11ee-a8d5-451ce28ad892.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.142 + 100.64.20.142 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694242913 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c183f160-4ede-11ee-a8d5-451ce28ad892 + + + diff --git a/graph/incidents_graphml/c/c1855d60-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c1855d60-24b8-11ef-9f46-91603b00c012.graphml new file mode 100644 index 0000000000000000000000000000000000000000..faec24e17a7e0e3186b9b8382849af5687c9250d --- /dev/null +++ b/graph/incidents_graphml/c/c1855d60-24b8-11ef-9f46-91603b00c012.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.6 + 100.64.49.6 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717756141 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c1855d60-24b8-11ef-9f46-91603b00c012 + + + diff --git a/graph/incidents_graphml/c/c186f2b0-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c186f2b0-8454-11ee-ad04-df7d06c31c2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4cddfbc527a715f10570fa6a500460afc6c8c51 --- /dev/null +++ b/graph/incidents_graphml/c/c186f2b0-8454-11ee-ad04-df7d06c31c2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.208 + 100.64.10.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700121005 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c186f2b0-8454-11ee-ad04-df7d06c31c2e + + + diff --git a/graph/incidents_graphml/c/c188b1d0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/c188b1d0-1c3c-11ed-9dc4-eb234c0496d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a32b9c15de881013aa9841915b1555b0f89c73b --- /dev/null +++ b/graph/incidents_graphml/c/c188b1d0-1c3c-11ed-9dc4-eb234c0496d2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.40 + 100.64.78.40 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.200 + 100.64.73.200 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660528278 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c188b1d0-1c3c-11ed-9dc4-eb234c0496d2 + + + INCIDENT_LINK + 1660528278 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c188b1d0-1c3c-11ed-9dc4-eb234c0496d2 + + + diff --git a/graph/incidents_graphml/c/c18b2040-1007-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/c/c18b2040-1007-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f73be2735d43b5aa6320d2ed3f7b91d91f9983df --- /dev/null +++ b/graph/incidents_graphml/c/c18b2040-1007-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.84 + 100.64.66.84 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687333599 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c18b2040-1007-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/c/c18fc0c0-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c18fc0c0-fe17-11ed-b81a-6328c43e92e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eed045e28b911948ac406f6fcdfa19a5853b78a4 --- /dev/null +++ b/graph/incidents_graphml/c/c18fc0c0-fe17-11ed-b81a-6328c43e92e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.27.119 + 100.64.27.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685361350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c18fc0c0-fe17-11ed-b81a-6328c43e92e7 + + + diff --git a/graph/incidents_graphml/c/c190f270-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c190f270-789b-11ee-8d62-1fa49ad9521f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbf7d4c7e93ed3fe8796af59c4aef46e9238051a --- /dev/null +++ b/graph/incidents_graphml/c/c190f270-789b-11ee-8d62-1fa49ad9521f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.142 + 100.64.30.142 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698832085 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c190f270-789b-11ee-8d62-1fa49ad9521f + + + diff --git a/graph/incidents_graphml/c/c19122b0-032d-11ee-bd4a-8bf288ff3594.graphml b/graph/incidents_graphml/c/c19122b0-032d-11ee-bd4a-8bf288ff3594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ceee19f91c7b51c775308d354a28eecc328e2bd --- /dev/null +++ b/graph/incidents_graphml/c/c19122b0-032d-11ee-bd4a-8bf288ff3594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.143 + 100.64.68.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.71.87 + 100.64.71.87 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685920555 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c19122b0-032d-11ee-bd4a-8bf288ff3594 + + + diff --git a/graph/incidents_graphml/c/c19bba20-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/c/c19bba20-f9fb-11ee-a91e-b385ff48b568.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7e6e89ef6cb4b2b2d61c5737fbfd7fe1fc595e6 --- /dev/null +++ b/graph/incidents_graphml/c/c19bba20-f9fb-11ee-a91e-b385ff48b568.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.54 + 100.64.64.54 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713057017 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c19bba20-f9fb-11ee-a91e-b385ff48b568 + + + diff --git a/graph/incidents_graphml/c/c1a0b670-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1a0b670-f298-11ee-947c-f57b4c0de6ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d302fb7c716a7ef54265626f07414b3871d9b02b --- /dev/null +++ b/graph/incidents_graphml/c/c1a0b670-f298-11ee-947c-f57b4c0de6ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.41.105.88 + 10.41.105.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.30.215 + USER-0015-1958.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1712244839 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c1a0b670-f298-11ee-947c-f57b4c0de6ec + + + diff --git a/graph/incidents_graphml/c/c1a4a180-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c1a4a180-789b-11ee-8d62-1fa49ad9521f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c7139f930788b8a675e4ebeba6fe60fde0224fc --- /dev/null +++ b/graph/incidents_graphml/c/c1a4a180-789b-11ee-8d62-1fa49ad9521f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.142 + 100.64.30.142 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698832086 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c1a4a180-789b-11ee-8d62-1fa49ad9521f + + + diff --git a/graph/incidents_graphml/c/c1a56210-3150-11ee-9a81-45e5b946e7a5.graphml b/graph/incidents_graphml/c/c1a56210-3150-11ee-9a81-45e5b946e7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f3b3a6cd1da3f9aab8331b25819f3c6416fd5f4 --- /dev/null +++ b/graph/incidents_graphml/c/c1a56210-3150-11ee-9a81-45e5b946e7a5.graphml @@ -0,0 +1,575 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.203 + 100.64.7.203 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.183 + USER-0015-1192.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.153 + 100.64.6.153 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.184 + 100.64.9.184 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.185 + 100.64.9.185 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.186 + USER-0015-1193.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.187 + 100.64.9.187 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.188 + 100.64.9.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.189 + 100.64.9.189 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.190 + 100.64.9.190 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.191 + 100.64.9.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.91 + 100.64.9.91 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.149 + 100.64.9.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.192 + 100.64.9.192 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.193 + 100.64.9.193 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.51 + 100.64.7.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993341 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1a56210-3150-11ee-9a81-45e5b946e7a5 + + + diff --git a/graph/incidents_graphml/c/c1ab8620-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c1ab8620-fe17-11ed-b81a-6328c43e92e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f396370bd3da3fed7dccf00aa1cef873272a116 --- /dev/null +++ b/graph/incidents_graphml/c/c1ab8620-fe17-11ed-b81a-6328c43e92e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.24.21 + 100.64.24.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685361350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c1ab8620-fe17-11ed-b81a-6328c43e92e7 + + + diff --git a/graph/incidents_graphml/c/c1acd910-1007-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/c/c1acd910-1007-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac1179a2f352af6ddd496944f61e806a975d9132 --- /dev/null +++ b/graph/incidents_graphml/c/c1acd910-1007-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.86 + 100.64.66.86 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687333599 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1acd910-1007-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/c/c1ad87b0-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1ad87b0-f298-11ee-947c-f57b4c0de6ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7831f33ac43916810a374775ee705c1dd4bb916 --- /dev/null +++ b/graph/incidents_graphml/c/c1ad87b0-f298-11ee-947c-f57b4c0de6ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.251 + USER-0015-1959.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.41.105.88 + 10.41.105.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1712244839 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1ad87b0-f298-11ee-947c-f57b4c0de6ec + + + diff --git a/graph/incidents_graphml/c/c1afb750-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/c/c1afb750-f9fb-11ee-a91e-b385ff48b568.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32cf68e674a0e505c5d1c35f9e35c9a29e2b13ba --- /dev/null +++ b/graph/incidents_graphml/c/c1afb750-f9fb-11ee-a91e-b385ff48b568.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.54 + 100.64.64.54 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713057017 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c1afb750-f9fb-11ee-a91e-b385ff48b568 + + + diff --git a/graph/incidents_graphml/c/c1b23bb0-1b49-11ee-80b5-4fc6a3f1abdb.graphml b/graph/incidents_graphml/c/c1b23bb0-1b49-11ee-80b5-4fc6a3f1abdb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6647e099521aa47304a9855d3bbf8da967a494a8 --- /dev/null +++ b/graph/incidents_graphml/c/c1b23bb0-1b49-11ee-80b5-4fc6a3f1abdb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.180 + 100.64.13.180 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.2.216.92 + 10.2.216.92 + [] + 0.4375 + ["Precinct"] + + + INCIDENT_LINK + 1688571409 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host"] + complete-mission + Disrupted + c1b23bb0-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host"] + complete-mission + Disrupted + c1b23bb0-1b49-11ee-80b5-4fc6a3f1abdb + + + diff --git a/graph/incidents_graphml/c/c1b3ef20-4a09-11ee-8bf8-c1f4992fd587.graphml b/graph/incidents_graphml/c/c1b3ef20-4a09-11ee-8bf8-c1f4992fd587.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fa242f157f6f9365d303cbf06434266667a9535 --- /dev/null +++ b/graph/incidents_graphml/c/c1b3ef20-4a09-11ee-8bf8-c1f4992fd587.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.79 + 100.64.33.79 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693711626 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1b3ef20-4a09-11ee-8bf8-c1f4992fd587 + + + diff --git a/graph/incidents_graphml/c/c1bc54c0-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1bc54c0-f298-11ee-947c-f57b4c0de6ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1171296ec4974f1a27124293edfde54066fd9a23 --- /dev/null +++ b/graph/incidents_graphml/c/c1bc54c0-f298-11ee-947c-f57b4c0de6ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.41.105.88 + 10.41.105.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.12.251 + USER-0015-1959.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1712244839 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c1bc54c0-f298-11ee-947c-f57b4c0de6ec + + + diff --git a/graph/incidents_graphml/c/c1bcb0e0-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c1bcb0e0-8de5-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..14bcc7a5dbfb9c3fcee85dc9d0b5334f87975a52 --- /dev/null +++ b/graph/incidents_graphml/c/c1bcb0e0-8de5-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.114 + 100.64.64.114 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701172843 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1bcb0e0-8de5-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/c1bd18d0-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c1bd18d0-065b-11ee-8408-0dec377ed8c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9bc85fe2c322692d0c883b9db547e68b3634886f --- /dev/null +++ b/graph/incidents_graphml/c/c1bd18d0-065b-11ee-8408-0dec377ed8c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.179 + 100.64.73.179 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686270165 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c1bd18d0-065b-11ee-8408-0dec377ed8c7 + + + diff --git a/graph/incidents_graphml/c/c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb.graphml b/graph/incidents_graphml/c/c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..380fe2ae6721445f986d081e733a57c7e714b932 --- /dev/null +++ b/graph/incidents_graphml/c/c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.123 + 100.64.8.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.181 + 100.64.13.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.182 + 100.64.13.182 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.183 + 100.64.13.183 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.184 + 100.64.13.184 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.185 + 100.64.13.185 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.186 + 100.64.13.186 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + INCIDENT_LINK + 1688571409 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb + + + diff --git a/graph/incidents_graphml/c/c1c92600-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1c92600-f298-11ee-947c-f57b4c0de6ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d52cb70fb01c4c4f9ef41564cfe2838115cbf0a8 --- /dev/null +++ b/graph/incidents_graphml/c/c1c92600-f298-11ee-947c-f57b4c0de6ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.7 + 100.64.84.7 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.41.105.88 + 10.41.105.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1712244839 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1c92600-f298-11ee-947c-f57b4c0de6ec + + + diff --git a/graph/incidents_graphml/c/c1cd79c0-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c1cd79c0-8de5-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50fcff1d46e3444589580a5028820ee39f28c38e --- /dev/null +++ b/graph/incidents_graphml/c/c1cd79c0-8de5-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.180 + 100.64.35.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701172843 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1cd79c0-8de5-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/c1d279a0-4ea9-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/c/c1d279a0-4ea9-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..873ea7f6379e38e0f517c6a273dd64cd5cec3db9 --- /dev/null +++ b/graph/incidents_graphml/c/c1d279a0-4ea9-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.150 + 100.64.41.150 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694220150 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c1d279a0-4ea9-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/c/c1d7f310-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1d7f310-f298-11ee-947c-f57b4c0de6ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81c9e07b9520d34efea400c86c013be8c6f78135 --- /dev/null +++ b/graph/incidents_graphml/c/c1d7f310-f298-11ee-947c-f57b4c0de6ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.41.105.88 + 10.41.105.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.7 + 100.64.84.7 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1712244839 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c1d7f310-f298-11ee-947c-f57b4c0de6ec + + + diff --git a/graph/incidents_graphml/c/c1dafa90-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c1dafa90-fe17-11ed-b81a-6328c43e92e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9ffc53dcfdf55133d4a7ea45e8af95b2ab9ae5a --- /dev/null +++ b/graph/incidents_graphml/c/c1dafa90-fe17-11ed-b81a-6328c43e92e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.80 + 100.64.15.80 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685361350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1dafa90-fe17-11ed-b81a-6328c43e92e7 + + + diff --git a/graph/incidents_graphml/c/c1daff90-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c1daff90-e0ed-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cc0f32462cc1936c8c76d973e00d3bd2ff26479 --- /dev/null +++ b/graph/incidents_graphml/c/c1daff90-e0ed-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.136 + 100.64.20.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710302226 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1daff90-e0ed-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/c/c1dcbc00-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c1dcbc00-8de5-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d9ac32b75f6817401204b90a608303393e90535 --- /dev/null +++ b/graph/incidents_graphml/c/c1dcbc00-8de5-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.180 + 100.64.35.180 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701172843 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c1dcbc00-8de5-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/c1e19c10-3ca6-11ee-874c-c948d9dda210.graphml b/graph/incidents_graphml/c/c1e19c10-3ca6-11ee-874c-c948d9dda210.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c3c6530baf25fd7889c7c3d64bb1a214f592378 --- /dev/null +++ b/graph/incidents_graphml/c/c1e19c10-3ca6-11ee-874c-c948d9dda210.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.232 + 100.64.47.232 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.233 + 100.64.47.233 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.170 + 100.64.40.170 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.234 + 100.64.47.234 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692239741 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1e19c10-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239741 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1e19c10-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239741 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1e19c10-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239741 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1e19c10-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239741 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1e19c10-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239741 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1e19c10-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239741 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1e19c10-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239741 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c1e19c10-3ca6-11ee-874c-c948d9dda210 + + + diff --git a/graph/incidents_graphml/c/c1e1b7d0-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c1e1b7d0-065b-11ee-8408-0dec377ed8c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..afc1fe4dd0cd6525d0d1755a933167e135f78aa3 --- /dev/null +++ b/graph/incidents_graphml/c/c1e1b7d0-065b-11ee-8408-0dec377ed8c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.226 + 100.64.73.226 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686270166 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1e1b7d0-065b-11ee-8408-0dec377ed8c7 + + + diff --git a/graph/incidents_graphml/c/c1e40100-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1e40100-f298-11ee-947c-f57b4c0de6ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6cee579995a287637e84618b5a08240926e8f277 --- /dev/null +++ b/graph/incidents_graphml/c/c1e40100-f298-11ee-947c-f57b4c0de6ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.8 + USER-0015-1960.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.41.105.88 + 10.41.105.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1712244839 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1e40100-f298-11ee-947c-f57b4c0de6ec + + + diff --git a/graph/incidents_graphml/c/c1f08360-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c1f08360-e0ed-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8531c9896d2fcd4a2244e4785a8b35cab5e02aa5 --- /dev/null +++ b/graph/incidents_graphml/c/c1f08360-e0ed-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.136 + 100.64.20.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710302226 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c1f08360-e0ed-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/c/c1f27ff0-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1f27ff0-f298-11ee-947c-f57b4c0de6ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a58b91d1fa58fde8a18ceabdb49359e2dc7e719 --- /dev/null +++ b/graph/incidents_graphml/c/c1f27ff0-f298-11ee-947c-f57b4c0de6ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.41.105.88 + 10.41.105.88 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.8 + USER-0015-1960.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1712244839 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c1f27ff0-f298-11ee-947c-f57b4c0de6ec + + + diff --git a/graph/incidents_graphml/c/c1f6c670-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c1f6c670-065b-11ee-8408-0dec377ed8c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e73acb4ef5d9ff6c0f8b7adfd6034576e02c09eb --- /dev/null +++ b/graph/incidents_graphml/c/c1f6c670-065b-11ee-8408-0dec377ed8c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.226 + 100.64.73.226 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686270166 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c1f6c670-065b-11ee-8408-0dec377ed8c7 + + + diff --git a/graph/incidents_graphml/c/c1fe1c80-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/c/c1fe1c80-6c00-11ee-9973-9b86183b2cfc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4bd21506e5091abad6b770fec072f0aacccea376 --- /dev/null +++ b/graph/incidents_graphml/c/c1fe1c80-6c00-11ee-9973-9b86183b2cfc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.16 + 100.64.90.16 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1697446100 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1fe1c80-6c00-11ee-9973-9b86183b2cfc + + + diff --git a/graph/incidents_graphml/c/c1fe4e80-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/c/c1fe4e80-ab6c-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..936a8aa9bd92cdbd5ed888f38f7f9619679ed4c7 --- /dev/null +++ b/graph/incidents_graphml/c/c1fe4e80-ab6c-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.90 + 100.64.88.90 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1676271911 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1fe4e80-ab6c-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/c/c1feb4f0-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1feb4f0-f298-11ee-947c-f57b4c0de6ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b25d8dd790009268c413c3e01ed458132ea682af --- /dev/null +++ b/graph/incidents_graphml/c/c1feb4f0-f298-11ee-947c-f57b4c0de6ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.234 + USER-0015-1961.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.41.105.88 + 10.41.105.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1712244839 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c1feb4f0-f298-11ee-947c-f57b4c0de6ec + + + diff --git a/graph/incidents_graphml/c/c2030970-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/c/c2030970-ab6c-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8ece6ad08b730b36542ac22c6440ff2c9321c1d --- /dev/null +++ b/graph/incidents_graphml/c/c2030970-ab6c-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.90 + 100.64.88.90 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676271911 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2030970-ab6c-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/c/c2059200-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c2059200-e0ed-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35e20ceaeb037a739ddd3d662994b2ad40ebbb4b --- /dev/null +++ b/graph/incidents_graphml/c/c2059200-e0ed-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.165 + 100.64.12.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710302226 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2059200-e0ed-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/c/c20879d0-13d2-11ef-ac06-779f33eb9435.graphml b/graph/incidents_graphml/c/c20879d0-13d2-11ef-ac06-779f33eb9435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bad06a7e2582ce9ce5d92a8dbe451abfc0b523ab --- /dev/null +++ b/graph/incidents_graphml/c/c20879d0-13d2-11ef-ac06-779f33eb9435.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.237.35 + 172.21.237.35 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.141.9.45 + 10.141.9.45 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.119.242 + 172.22.119.242 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715898139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c20879d0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c20879d0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c20879d0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c20879d0-13d2-11ef-ac06-779f33eb9435 + + + diff --git a/graph/incidents_graphml/c/c20ae430-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c20ae430-fe17-11ed-b81a-6328c43e92e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd4be58d6e1647ca41e5bd6c7ee14e38550e1041 --- /dev/null +++ b/graph/incidents_graphml/c/c20ae430-fe17-11ed-b81a-6328c43e92e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.121 + 100.64.27.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685361351 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c20ae430-fe17-11ed-b81a-6328c43e92e7 + + + diff --git a/graph/incidents_graphml/c/c20bfc20-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c20bfc20-065b-11ee-8408-0dec377ed8c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..97f220d6181cffdd17acaac0d69cd4257accc57f --- /dev/null +++ b/graph/incidents_graphml/c/c20bfc20-065b-11ee-8408-0dec377ed8c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.227 + 100.64.73.227 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686270166 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c20bfc20-065b-11ee-8408-0dec377ed8c7 + + + diff --git a/graph/incidents_graphml/c/c20d33e0-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c20d33e0-f298-11ee-947c-f57b4c0de6ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..178de60923dcb767e481676b9f21be775235d994 --- /dev/null +++ b/graph/incidents_graphml/c/c20d33e0-f298-11ee-947c-f57b4c0de6ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.41.105.88 + 10.41.105.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.29.234 + USER-0015-1961.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1712244840 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c20d33e0-f298-11ee-947c-f57b4c0de6ec + + + diff --git a/graph/incidents_graphml/c/c20d85d0-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/c/c20d85d0-6c00-11ee-9973-9b86183b2cfc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd5311583ad9afd5e261cd38ea2518d0e94e6f6f --- /dev/null +++ b/graph/incidents_graphml/c/c20d85d0-6c00-11ee-9973-9b86183b2cfc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.90.16 + 100.64.90.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697446100 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c20d85d0-6c00-11ee-9973-9b86183b2cfc + + + diff --git a/graph/incidents_graphml/c/c2137210-032d-11ee-bd4a-8bf288ff3594.graphml b/graph/incidents_graphml/c/c2137210-032d-11ee-bd4a-8bf288ff3594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03a6a58fb7a05fa6f723c5d534ca68d2bc829f34 --- /dev/null +++ b/graph/incidents_graphml/c/c2137210-032d-11ee-bd4a-8bf288ff3594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.85 + 100.64.71.85 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"] + + + HOST + 100.64.4.90 + 100.64.4.90 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1685920556 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2137210-032d-11ee-bd4a-8bf288ff3594 + + + diff --git a/graph/incidents_graphml/c/c219b700-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c219b700-f298-11ee-947c-f57b4c0de6ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa6ca4625ae71631fe72574d114ecd2028127fa1 --- /dev/null +++ b/graph/incidents_graphml/c/c219b700-f298-11ee-947c-f57b4c0de6ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.71 + USER-0015-1962.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.41.105.88 + 10.41.105.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1712244840 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c219b700-f298-11ee-947c-f57b4c0de6ec + + + diff --git a/graph/incidents_graphml/c/c21e9840-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c21e9840-e0ed-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b744a801dc0858df117402efec692fb34d057908 --- /dev/null +++ b/graph/incidents_graphml/c/c21e9840-e0ed-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.165 + 100.64.12.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710302226 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c21e9840-e0ed-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/c/c2206e80-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c2206e80-065b-11ee-8408-0dec377ed8c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2cd0c5595e371f33f02ffcb050fd5ada63f68851 --- /dev/null +++ b/graph/incidents_graphml/c/c2206e80-065b-11ee-8408-0dec377ed8c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.227 + 100.64.73.227 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686270166 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2206e80-065b-11ee-8408-0dec377ed8c7 + + + diff --git a/graph/incidents_graphml/c/c225bf30-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c225bf30-fe17-11ed-b81a-6328c43e92e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32eaf674be5d04ab16cc3d2723b5f108b65f009e --- /dev/null +++ b/graph/incidents_graphml/c/c225bf30-fe17-11ed-b81a-6328c43e92e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.27.121 + 100.64.27.121 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685361351 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c225bf30-fe17-11ed-b81a-6328c43e92e7 + + + diff --git a/graph/incidents_graphml/c/c22af480-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c22af480-0cab-11ee-8985-55bb832fcc7f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87ee0813cd7f6c007eef57da2bcac25342ae3586 --- /dev/null +++ b/graph/incidents_graphml/c/c22af480-0cab-11ee-8985-55bb832fcc7f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.157 + 100.64.1.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.83.48 + 100.64.83.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686964233 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c22af480-0cab-11ee-8985-55bb832fcc7f + + + INCIDENT_LINK + 1686964233 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c22af480-0cab-11ee-8985-55bb832fcc7f + + + diff --git a/graph/incidents_graphml/c/c23358c0-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c23358c0-e0ed-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fa5c8f3579dc475c2cdf766bf6a636706f2e2b3 --- /dev/null +++ b/graph/incidents_graphml/c/c23358c0-e0ed-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.100 + 100.64.22.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710302226 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c23358c0-e0ed-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/c/c2357d20-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c2357d20-065b-11ee-8408-0dec377ed8c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff9e3471308091d13d9d11bad04d0d371a9d087b --- /dev/null +++ b/graph/incidents_graphml/c/c2357d20-065b-11ee-8408-0dec377ed8c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.228 + 100.64.73.228 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686270166 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2357d20-065b-11ee-8408-0dec377ed8c7 + + + diff --git a/graph/incidents_graphml/c/c2364120-00b9-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/c/c2364120-00b9-11ef-8b56-b9c5ad676a8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb48762dccbe0cc35463152ea05fc2ef51b1c838 --- /dev/null +++ b/graph/incidents_graphml/c/c2364120-00b9-11ef-8b56-b9c5ad676a8a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.70 + 100.64.13.70 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.31.158 + 100.64.31.158 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713798329 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2364120-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798329 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2364120-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798329 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2364120-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798329 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2364120-00b9-11ef-8b56-b9c5ad676a8a + + + diff --git a/graph/incidents_graphml/c/c242bd10-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c242bd10-fe17-11ed-b81a-6328c43e92e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16f5c0ee8770a2ce4f7cfe5265d5b678c6c1b9eb --- /dev/null +++ b/graph/incidents_graphml/c/c242bd10-fe17-11ed-b81a-6328c43e92e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.61 + 100.64.12.61 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685361351 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c242bd10-fe17-11ed-b81a-6328c43e92e7 + + + diff --git a/graph/incidents_graphml/c/c2492c30-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c2492c30-065b-11ee-8408-0dec377ed8c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3c73aaa2600a7018a68ecd70ed09779d6f2e2b5 --- /dev/null +++ b/graph/incidents_graphml/c/c2492c30-065b-11ee-8408-0dec377ed8c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.228 + 100.64.73.228 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686270166 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c2492c30-065b-11ee-8408-0dec377ed8c7 + + + diff --git a/graph/incidents_graphml/c/c24e0cb0-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c24e0cb0-e0ed-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..161c3b11491c0cff5d86bdc946f6d0349b1fe55d --- /dev/null +++ b/graph/incidents_graphml/c/c24e0cb0-e0ed-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.100 + 100.64.22.100 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710302226 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c24e0cb0-e0ed-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/c/c25cbb70-056f-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/c/c25cbb70-056f-11ee-bce7-dffdb32a6ba9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c1daa9786dc8ae3f2750b62ef6f578a4f4331f5 --- /dev/null +++ b/graph/incidents_graphml/c/c25cbb70-056f-11ee-bce7-dffdb32a6ba9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.137 + 100.64.72.137 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.59.179 + 100.64.59.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1686168805 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c25cbb70-056f-11ee-bce7-dffdb32a6ba9 + + + INCIDENT_LINK + 1686168805 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c25cbb70-056f-11ee-bce7-dffdb32a6ba9 + + + diff --git a/graph/incidents_graphml/c/c25fe200-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c25fe200-fe17-11ed-b81a-6328c43e92e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..212588f57633e1f996443d71f756afff3df08a9b --- /dev/null +++ b/graph/incidents_graphml/c/c25fe200-fe17-11ed-b81a-6328c43e92e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.12.61 + 100.64.12.61 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685361351 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c25fe200-fe17-11ed-b81a-6328c43e92e7 + + + diff --git a/graph/incidents_graphml/c/c261d3c0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/c261d3c0-1c3c-11ed-9dc4-eb234c0496d2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..009f6ec47ec99d13345d62704a32d9aa7f3dbdd7 --- /dev/null +++ b/graph/incidents_graphml/c/c261d3c0-1c3c-11ed-9dc4-eb234c0496d2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.41 + 100.64.78.41 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.234 + 100.64.70.234 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660528280 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c261d3c0-1c3c-11ed-9dc4-eb234c0496d2 + + + INCIDENT_LINK + 1660528280 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c261d3c0-1c3c-11ed-9dc4-eb234c0496d2 + + + diff --git a/graph/incidents_graphml/c/c26747c0-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c26747c0-6bc2-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abbc1d8960ffdd625c0af4eaf3bd19a3379e2fcd --- /dev/null +++ b/graph/incidents_graphml/c/c26747c0-6bc2-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.123 + 100.64.62.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697419472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c26747c0-6bc2-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/c/c2687f80-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/c/c2687f80-182c-11ee-b591-f5bec484f8bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0170e1b75f7d4d1fa4878ecf0e12608e97831d41 --- /dev/null +++ b/graph/incidents_graphml/c/c2687f80-182c-11ee-b591-f5bec484f8bc.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.75 + 100.64.73.75 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.76 + 100.64.73.76 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.77 + 100.64.73.77 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.78 + 100.64.73.78 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.79 + USER-0015-1651.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688229101 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2687f80-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229101 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2687f80-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229101 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2687f80-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229101 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2687f80-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229101 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2687f80-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229101 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2687f80-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229101 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2687f80-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229101 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2687f80-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229101 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2687f80-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229101 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2687f80-182c-11ee-b591-f5bec484f8bc + + + diff --git a/graph/incidents_graphml/c/c2688f40-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c2688f40-facf-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e7014c7bb146c5d653036b9714c328b212d7bd0 --- /dev/null +++ b/graph/incidents_graphml/c/c2688f40-facf-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.29.252 + 100.64.29.252 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685000574 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2688f40-facf-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/c/c269f800-e280-11ee-bdbd-61ca27aa8970.graphml b/graph/incidents_graphml/c/c269f800-e280-11ee-bdbd-61ca27aa8970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d7a1604d52c516ce24ce825af95b35bdfd08a7f --- /dev/null +++ b/graph/incidents_graphml/c/c269f800-e280-11ee-bdbd-61ca27aa8970.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.242 + 100.64.61.242 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.243 + 100.64.61.243 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.142 + 100.64.60.142 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.237 + 100.64.56.237 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.248 + 100.64.19.248 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.244 + 100.64.61.244 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710475314 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c269f800-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475314 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c269f800-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475314 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c269f800-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475314 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c269f800-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475314 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c269f800-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475314 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c269f800-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475314 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c269f800-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475314 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c269f800-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475314 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c269f800-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475314 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c269f800-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475314 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c269f800-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475314 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c269f800-e280-11ee-bdbd-61ca27aa8970 + + + diff --git a/graph/incidents_graphml/c/c26dc740-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/c/c26dc740-0d16-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e2b2c9163d0976e068d1acb5b755d5ff7a3353a --- /dev/null +++ b/graph/incidents_graphml/c/c26dc740-0d16-11ee-9392-932bfd273540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.198 + 100.64.82.198 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687010189 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c26dc740-0d16-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/c/c2732f40-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2732f40-57e5-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f495f61a7e5bd18bee89e7df9dee49ad77caef8f --- /dev/null +++ b/graph/incidents_graphml/c/c2732f40-57e5-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.67 + 100.64.44.67 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695235481 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2732f40-57e5-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/c/c274bd10-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/c/c274bd10-a0fb-11ee-b868-0b39d8f52622.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce841cd6eedc9450fa83cec2da9e16b389bcd3db --- /dev/null +++ b/graph/incidents_graphml/c/c274bd10-a0fb-11ee-b868-0b39d8f52622.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.188 + 100.64.14.188 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703271365 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c274bd10-a0fb-11ee-b868-0b39d8f52622 + + + diff --git a/graph/incidents_graphml/c/c276b110-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c276b110-6bc2-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5286b069258e77f78fd3882f2bae4cfb90d24ab --- /dev/null +++ b/graph/incidents_graphml/c/c276b110-6bc2-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.123 + 100.64.62.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697419472 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c276b110-6bc2-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/c/c2837220-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/c/c2837220-0d16-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ba23e919c5e57d6dae1d8436667da9a5ba7c841 --- /dev/null +++ b/graph/incidents_graphml/c/c2837220-0d16-11ee-9392-932bfd273540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.198 + 100.64.82.198 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687010190 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2837220-0d16-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/c/c2846d50-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2846d50-57e5-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a2767b5249f2c1eaff66040da9741f3f39ca92c --- /dev/null +++ b/graph/incidents_graphml/c/c2846d50-57e5-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.67 + 100.64.44.67 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695235481 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2846d50-57e5-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/c/c286b6a0-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c286b6a0-6bc2-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3f001d7e118eea0550d47adc371c2fa3087e182 --- /dev/null +++ b/graph/incidents_graphml/c/c286b6a0-6bc2-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.125 + 100.64.62.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697419472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c286b6a0-6bc2-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/c/c288cd60-13d2-11ef-ac06-779f33eb9435.graphml b/graph/incidents_graphml/c/c288cd60-13d2-11ef-ac06-779f33eb9435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d249db1a21543d833644ada7aeba9dabf5289531 --- /dev/null +++ b/graph/incidents_graphml/c/c288cd60-13d2-11ef-ac06-779f33eb9435.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.87 + 100.64.61.87 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.66 + 100.64.40.66 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.88 + 100.64.61.88 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.89 + USER-0015-1445.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.236 + 100.64.40.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.187 + 100.64.37.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.90 + 100.64.61.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.158 + 100.64.31.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.91 + 100.64.61.91 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.64 + 100.64.15.64 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.153 + 100.64.3.153 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.114 + 100.64.22.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.54 + 100.64.15.54 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.106 + 100.64.20.106 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.92 + 100.64.61.92 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.0.70 + 100.64.0.70 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.0.71 + 100.64.0.71 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.161 + 100.64.24.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c288cd60-13d2-11ef-ac06-779f33eb9435 + + + diff --git a/graph/incidents_graphml/c/c28c73e0-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c28c73e0-41fd-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3104a914acc94da6578dd8eea63abdd4e2513d0c --- /dev/null +++ b/graph/incidents_graphml/c/c28c73e0-41fd-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.135 + USER-0015-1475.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692826864 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c28c73e0-41fd-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c2955ca0-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c2955ca0-6bc2-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4aee39c24e5dfb7301741b0bf2be8058fecfe3f --- /dev/null +++ b/graph/incidents_graphml/c/c2955ca0-6bc2-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.125 + 100.64.62.125 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697419472 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2955ca0-6bc2-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/c/c297f550-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c297f550-57e5-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a703eda4493aae8bbd3d375cd2b6254dfc1ef489 --- /dev/null +++ b/graph/incidents_graphml/c/c297f550-57e5-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.69 + 100.64.44.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695235481 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c297f550-57e5-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/c/c29b09c0-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/c/c29b09c0-a0fb-11ee-b868-0b39d8f52622.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e9eac8de03f2ac951500e2bacbc5967e0bb9a7d --- /dev/null +++ b/graph/incidents_graphml/c/c29b09c0-a0fb-11ee-b868-0b39d8f52622.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.192 + 100.64.14.192 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703271365 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c29b09c0-a0fb-11ee-b868-0b39d8f52622 + + + diff --git a/graph/incidents_graphml/c/c29c2b50-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c29c2b50-41fd-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28378f01ee91982d769d7e36a11904db58dc4677 --- /dev/null +++ b/graph/incidents_graphml/c/c29c2b50-41fd-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.135 + USER-0015-1475.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692826864 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c29c2b50-41fd-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c29f4b30-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/c29f4b30-2607-11ee-ad88-fb76ca0617eb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15ffcc6ef6aa40e745678f54ebdf3aba30dd7b2c --- /dev/null +++ b/graph/incidents_graphml/c/c29f4b30-2607-11ee-ad88-fb76ca0617eb.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.174 + 100.64.61.174 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689752526 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c29f4b30-2607-11ee-ad88-fb76ca0617eb + + + INCIDENT_LINK + 1689752526 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c29f4b30-2607-11ee-ad88-fb76ca0617eb + + + diff --git a/graph/incidents_graphml/c/c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/c/c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c601428ad870402b3cd9a1b9beee3e5119693a4 --- /dev/null +++ b/graph/incidents_graphml/c/c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.199.11.73 + 10.199.11.73 + ["Exploiting Host"] + 0.841796875 + ["Precinct","PAN NGFW","Windows Active Directory"] + + + HOST + 100.64.70.170 + 100.64.70.170 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.171 + 100.64.70.171 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.172 + 100.64.70.172 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.173 + 100.64.70.173 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.174 + 100.64.70.174 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.166 + 100.64.70.166 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.175 + 100.64.70.175 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.176 + 100.64.70.176 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.125 + 100.64.70.125 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.177 + 100.64.70.177 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713798330 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a + + + diff --git a/graph/incidents_graphml/c/c2a1b8b0-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c2a1b8b0-6bc2-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..126800a052892c5499feab283604fe6190ed3abb --- /dev/null +++ b/graph/incidents_graphml/c/c2a1b8b0-6bc2-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.211 + 100.64.33.211 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697419472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2a1b8b0-6bc2-11ee-ac23-0990c4be3eac + + + INCIDENT_LINK + 1697419472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2a1b8b0-6bc2-11ee-ac23-0990c4be3eac + + + INCIDENT_LINK + 1697419472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2a1b8b0-6bc2-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/c/c2a91ab0-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c2a91ab0-facf-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d137e25fffb6e9b71d488f7635804b59dcd540d --- /dev/null +++ b/graph/incidents_graphml/c/c2a91ab0-facf-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.254 + 100.64.29.254 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685000575 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2a91ab0-facf-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/c/c2aa92f0-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2aa92f0-57e5-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b799da04fbf4f7cd9acf3689f4e830b72d03163e --- /dev/null +++ b/graph/incidents_graphml/c/c2aa92f0-57e5-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.69 + 100.64.44.69 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695235482 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2aa92f0-57e5-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/c/c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf.graphml b/graph/incidents_graphml/c/c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60a406d946cadb676568b96f3cbe2a5ead435d7d --- /dev/null +++ b/graph/incidents_graphml/c/c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.151 + 100.64.94.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.58.149 + 100.64.58.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.101 + 100.64.44.101 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.15.55 + 100.64.15.55 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.13.218 + 100.64.13.218 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714983312 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983312 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983312 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983312 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983312 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983312 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983312 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983312 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983312 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983312 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf + + + diff --git a/graph/incidents_graphml/c/c2ae08a0-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c2ae08a0-41dc-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..75e763db4c17ef3ca082b8592ad4ff13356b8fae --- /dev/null +++ b/graph/incidents_graphml/c/c2ae08a0-41dc-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,755 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.217 + 100.64.19.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.226 + 100.64.67.226 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.227 + 100.64.67.227 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.228 + 100.64.67.228 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.130 + 100.64.11.130 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.80 + 100.64.8.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.229 + 100.64.67.229 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.246 + 100.64.28.246 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.230 + 100.64.67.230 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.70 + 100.64.33.70 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.231 + 100.64.67.231 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.224 + 100.64.67.224 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.221 + 100.64.53.221 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.232 + 100.64.67.232 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.48 + 100.64.14.48 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.27 + 100.64.51.27 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.233 + 100.64.67.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.234 + 100.64.67.234 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.79 + 100.64.47.79 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1692812691 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2ae08a0-41dc-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c2b0d3e0-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c2b0d3e0-6bc2-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a43d3e9e2aa6febb524d98a0af873ae645f99cd7 --- /dev/null +++ b/graph/incidents_graphml/c/c2b0d3e0-6bc2-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.211 + 100.64.33.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697419472 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2b0d3e0-6bc2-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/c/c2b82a60-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/c2b82a60-2607-11ee-ad88-fb76ca0617eb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5badd6cef3ea7b7bf83d781ab7f4084b6f63ac02 --- /dev/null +++ b/graph/incidents_graphml/c/c2b82a60-2607-11ee-ad88-fb76ca0617eb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.174 + 100.64.61.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689752526 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c2b82a60-2607-11ee-ad88-fb76ca0617eb + + + diff --git a/graph/incidents_graphml/c/c2bb82e0-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2bb82e0-57e5-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5814280bf7cc2777655c8138e0fecedcd8f47985 --- /dev/null +++ b/graph/incidents_graphml/c/c2bb82e0-57e5-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695235482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2bb82e0-57e5-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/c/c2bdb420-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c2bdb420-facf-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9bda239209e7169a391e850ced39ff75fc5b7ad --- /dev/null +++ b/graph/incidents_graphml/c/c2bdb420-facf-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.29.254 + 100.64.29.254 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685000575 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2bdb420-facf-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/c/c2c40180-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c2c40180-065b-11ee-8408-0dec377ed8c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28bd1d9ef697359191c98ab353955c1a9df21748 --- /dev/null +++ b/graph/incidents_graphml/c/c2c40180-065b-11ee-8408-0dec377ed8c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.254 + 100.64.72.254 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686270167 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2c40180-065b-11ee-8408-0dec377ed8c7 + + + diff --git a/graph/incidents_graphml/c/c2c5ce30-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/c/c2c5ce30-1fe1-11ee-80ac-1985e110d782.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15e84e6d7b2f4a8b215d3bcaa6ccd626af300ac8 --- /dev/null +++ b/graph/incidents_graphml/c/c2c5ce30-1fe1-11ee-80ac-1985e110d782.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.44 + 100.64.57.44 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689076499 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2c5ce30-1fe1-11ee-80ac-1985e110d782 + + + diff --git a/graph/incidents_graphml/c/c2caec30-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2caec30-57e5-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd849ed9984e1eff9d7006b118af4f807a43c1e4 --- /dev/null +++ b/graph/incidents_graphml/c/c2caec30-57e5-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695235482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c2caec30-57e5-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/c/c2cc42e0-3e56-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/c/c2cc42e0-3e56-11ee-9b4e-c562a9c40af9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cebe79d5d19c78d8787787d1a3de66ad6eee8e7 --- /dev/null +++ b/graph/incidents_graphml/c/c2cc42e0-3e56-11ee-9b4e-c562a9c40af9.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.137 + 100.64.69.137 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692425285 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2cc42e0-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425285 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2cc42e0-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425285 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2cc42e0-3e56-11ee-9b4e-c562a9c40af9 + + + INCIDENT_LINK + 1692425285 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c2cc42e0-3e56-11ee-9b4e-c562a9c40af9 + + + diff --git a/graph/incidents_graphml/c/c2d0d6d0-1411-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/c/c2d0d6d0-1411-11ee-918c-e193118b03e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17a3941ed515d099accdb6b6582d34938a8eb709 --- /dev/null +++ b/graph/incidents_graphml/c/c2d0d6d0-1411-11ee-918c-e193118b03e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.78 + 100.64.65.78 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687777701 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2d0d6d0-1411-11ee-918c-e193118b03e7 + + + diff --git a/graph/incidents_graphml/c/c2db8e00-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2db8e00-57e5-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5470ab2e0102e07784ca5d3435674a378ad607d6 --- /dev/null +++ b/graph/incidents_graphml/c/c2db8e00-57e5-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.71 + 100.64.44.71 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695235482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2db8e00-57e5-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/c/c2de3ef0-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c2de3ef0-0cab-11ee-8985-55bb832fcc7f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ccc4bd2f9874a44a8d6d719c08ca1b2c6c3dd55 --- /dev/null +++ b/graph/incidents_graphml/c/c2de3ef0-0cab-11ee-8985-55bb832fcc7f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.33 + USER-0015-1830.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686964234 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2de3ef0-0cab-11ee-8985-55bb832fcc7f + + + diff --git a/graph/incidents_graphml/c/c2e0ff60-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c2e0ff60-065b-11ee-8408-0dec377ed8c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ace9900af4c7284433c0698c50cfcc256942328 --- /dev/null +++ b/graph/incidents_graphml/c/c2e0ff60-065b-11ee-8408-0dec377ed8c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.254 + 100.64.72.254 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686270167 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2e0ff60-065b-11ee-8408-0dec377ed8c7 + + + diff --git a/graph/incidents_graphml/c/c2e19820-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/c/c2e19820-be7c-11ed-9564-3d773f19984f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..871c32164ccd8ae3016fecae22ad33f29d57a2c7 --- /dev/null +++ b/graph/incidents_graphml/c/c2e19820-be7c-11ed-9564-3d773f19984f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.1 + 100.64.97.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678367857 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2e19820-be7c-11ed-9564-3d773f19984f + + + diff --git a/graph/incidents_graphml/c/c2e23cf0-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c2e23cf0-8454-11ee-ad04-df7d06c31c2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9a5b4a7621d754f2e0c9f1f8499964fcbb9422a --- /dev/null +++ b/graph/incidents_graphml/c/c2e23cf0-8454-11ee-ad04-df7d06c31c2e.graphml @@ -0,0 +1,129 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.173 + 100.64.33.173 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700121007 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2e23cf0-8454-11ee-ad04-df7d06c31c2e + + + INCIDENT_LINK + 1700121007 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2e23cf0-8454-11ee-ad04-df7d06c31c2e + + + INCIDENT_LINK + 1700121007 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2e23cf0-8454-11ee-ad04-df7d06c31c2e + + + INCIDENT_LINK + 1700121007 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2e23cf0-8454-11ee-ad04-df7d06c31c2e + + + diff --git a/graph/incidents_graphml/c/c2e56420-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/c/c2e56420-1fe1-11ee-80ac-1985e110d782.graphml new file mode 100644 index 0000000000000000000000000000000000000000..007b1c14a81a481cc7df27b5111f073ab09ba47d --- /dev/null +++ b/graph/incidents_graphml/c/c2e56420-1fe1-11ee-80ac-1985e110d782.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.44 + 100.64.57.44 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689076499 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2e56420-1fe1-11ee-80ac-1985e110d782 + + + diff --git a/graph/incidents_graphml/c/c2e7b2a0-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/c/c2e7b2a0-be7c-11ed-9564-3d773f19984f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d323ea750fc4bbb7b52a8765bf17af9d39b09e8 --- /dev/null +++ b/graph/incidents_graphml/c/c2e7b2a0-be7c-11ed-9564-3d773f19984f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678367857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2e7b2a0-be7c-11ed-9564-3d773f19984f + + + diff --git a/graph/incidents_graphml/c/c2e8d470-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2e8d470-57e5-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f48c9343f1c15713957377413a3976a9e0e078f0 --- /dev/null +++ b/graph/incidents_graphml/c/c2e8d470-57e5-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.71 + 100.64.44.71 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695235482 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2e8d470-57e5-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/c/c2ec8e80-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c2ec8e80-24b8-11ef-9f46-91603b00c012.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f07482c9f8a3a64c2cbd55c0c1316601fbc610d --- /dev/null +++ b/graph/incidents_graphml/c/c2ec8e80-24b8-11ef-9f46-91603b00c012.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.8 + 100.64.49.8 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717756143 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2ec8e80-24b8-11ef-9f46-91603b00c012 + + + diff --git a/graph/incidents_graphml/c/c2f35ae0-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/c/c2f35ae0-f9fb-11ee-a91e-b385ff48b568.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d75378307bb9a47b6d9194fa11e215f2da9c3ad4 --- /dev/null +++ b/graph/incidents_graphml/c/c2f35ae0-f9fb-11ee-a91e-b385ff48b568.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.56 + 100.64.64.56 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713057019 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c2f35ae0-f9fb-11ee-a91e-b385ff48b568 + + + diff --git a/graph/incidents_graphml/c/c2fcc9d0-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c2fcc9d0-8454-11ee-ad04-df7d06c31c2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8f31e16176e7055eba998d8bd4ae813928a348e --- /dev/null +++ b/graph/incidents_graphml/c/c2fcc9d0-8454-11ee-ad04-df7d06c31c2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.173 + 100.64.33.173 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700121007 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c2fcc9d0-8454-11ee-ad04-df7d06c31c2e + + + diff --git a/graph/incidents_graphml/c/c3017e60-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c3017e60-0cab-11ee-8985-55bb832fcc7f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6222844358c0cb360c707892a5c755d7e502dfa --- /dev/null +++ b/graph/incidents_graphml/c/c3017e60-0cab-11ee-8985-55bb832fcc7f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.33 + USER-0015-1830.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686964234 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3017e60-0cab-11ee-8985-55bb832fcc7f + + + diff --git a/graph/incidents_graphml/c/c301c5c0-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/c/c301c5c0-1fe1-11ee-80ac-1985e110d782.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5166751236aeea143eb73dfba6c25c8d6c8621db --- /dev/null +++ b/graph/incidents_graphml/c/c301c5c0-1fe1-11ee-80ac-1985e110d782.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.46 + 100.64.57.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689076499 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c301c5c0-1fe1-11ee-80ac-1985e110d782 + + + diff --git a/graph/incidents_graphml/c/c30b9980-83e9-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/c/c30b9980-83e9-11ee-9ada-6590fb922310.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30b287e1d6e1c646e52c5682ef6cf144012c083d --- /dev/null +++ b/graph/incidents_graphml/c/c30b9980-83e9-11ee-9ada-6590fb922310.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.170 + 100.64.17.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700075051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c30b9980-83e9-11ee-9ada-6590fb922310 + + + INCIDENT_LINK + 1700075051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c30b9980-83e9-11ee-9ada-6590fb922310 + + + diff --git a/graph/incidents_graphml/c/c31248b0-13d2-11ef-ac06-779f33eb9435.graphml b/graph/incidents_graphml/c/c31248b0-13d2-11ef-ac06-779f33eb9435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4582d1aa04ea2e0bae32ba123cb61b920a4f27c --- /dev/null +++ b/graph/incidents_graphml/c/c31248b0-13d2-11ef-ac06-779f33eb9435.graphml @@ -0,0 +1,797 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.98 + 100.64.61.98 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.99 + 100.64.61.99 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.100 + 100.64.61.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.101 + 100.64.61.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.33 + 100.64.42.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.247 + 100.64.23.247 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.185 + 100.64.15.185 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.102 + 100.64.61.102 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.103 + 100.64.61.103 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.104 + 100.64.61.104 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.105 + 100.64.61.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.106 + 100.64.61.106 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.107 + 100.64.61.107 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.93 + 100.64.10.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.248 + 100.64.19.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.10.11 + 100.64.10.11 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.199 + 100.64.48.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.251 + 100.64.14.251 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31248b0-13d2-11ef-ac06-779f33eb9435 + + + diff --git a/graph/incidents_graphml/c/c314e5b0-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c314e5b0-8454-11ee-ad04-df7d06c31c2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7b71681bfd0a72eaf875cb1407a70e3f372329f --- /dev/null +++ b/graph/incidents_graphml/c/c314e5b0-8454-11ee-ad04-df7d06c31c2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.175 + 100.64.33.175 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700121008 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c314e5b0-8454-11ee-ad04-df7d06c31c2e + + + diff --git a/graph/incidents_graphml/c/c31de9d0-925f-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/c/c31de9d0-925f-11ee-ac87-cff3005068fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56bbf50f1a7e61ce107cf4a29476e8df9d98af73 --- /dev/null +++ b/graph/incidents_graphml/c/c31de9d0-925f-11ee-ac87-cff3005068fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.184 + 100.64.66.184 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701665048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c31de9d0-925f-11ee-ac87-cff3005068fb + + + diff --git a/graph/incidents_graphml/c/c31e1cc0-7135-11ee-bce1-87535eed5229.graphml b/graph/incidents_graphml/c/c31e1cc0-7135-11ee-bce1-87535eed5229.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9ffd0563e9f5717456e6ad30a424ae67f1e8597 --- /dev/null +++ b/graph/incidents_graphml/c/c31e1cc0-7135-11ee-bce1-87535eed5229.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.107 + 100.64.31.107 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698018621 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c31e1cc0-7135-11ee-bce1-87535eed5229 + + + diff --git a/graph/incidents_graphml/c/c320f640-83e9-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/c/c320f640-83e9-11ee-9ada-6590fb922310.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9aebe9b4e0475f08c3d74b9432c15ded16b9ec4 --- /dev/null +++ b/graph/incidents_graphml/c/c320f640-83e9-11ee-9ada-6590fb922310.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.172 + 100.64.17.172 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700075052 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c320f640-83e9-11ee-9ada-6590fb922310 + + + diff --git a/graph/incidents_graphml/c/c322e250-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/c/c322e250-1fe1-11ee-80ac-1985e110d782.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1fc3ac97bd7ce6a24c4c2501d35c66e26a9edff7 --- /dev/null +++ b/graph/incidents_graphml/c/c322e250-1fe1-11ee-80ac-1985e110d782.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.46 + 100.64.57.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689076499 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c322e250-1fe1-11ee-80ac-1985e110d782 + + + diff --git a/graph/incidents_graphml/c/c331d010-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/c/c331d010-b6de-11ed-9d21-f346d8153a36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d0e5182103bd4d5a7fa7567e007ff8bcb590229 --- /dev/null +++ b/graph/incidents_graphml/c/c331d010-b6de-11ed-9d21-f346d8153a36.graphml @@ -0,0 +1,201 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.207 + 100.64.91.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.77.234 + 100.64.77.234 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.25.3 + 100.64.25.3 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.78.153 + 100.64.78.153 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677530339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c331d010-b6de-11ed-9d21-f346d8153a36 + + + INCIDENT_LINK + 1677530339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c331d010-b6de-11ed-9d21-f346d8153a36 + + + INCIDENT_LINK + 1677530339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c331d010-b6de-11ed-9d21-f346d8153a36 + + + INCIDENT_LINK + 1677530339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c331d010-b6de-11ed-9d21-f346d8153a36 + + + INCIDENT_LINK + 1677530339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c331d010-b6de-11ed-9d21-f346d8153a36 + + + INCIDENT_LINK + 1677530339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c331d010-b6de-11ed-9d21-f346d8153a36 + + + INCIDENT_LINK + 1677530339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c331d010-b6de-11ed-9d21-f346d8153a36 + + + INCIDENT_LINK + 1677530339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c331d010-b6de-11ed-9d21-f346d8153a36 + + + diff --git a/graph/incidents_graphml/c/c332bf40-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c332bf40-24b8-11ef-9f46-91603b00c012.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d227589c9cf2051aecd7531afe78db3aa6d7098f --- /dev/null +++ b/graph/incidents_graphml/c/c332bf40-24b8-11ef-9f46-91603b00c012.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.10 + 100.64.49.10 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717756144 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c332bf40-24b8-11ef-9f46-91603b00c012 + + + INCIDENT_LINK + 1717756144 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c332bf40-24b8-11ef-9f46-91603b00c012 + + + diff --git a/graph/incidents_graphml/c/c3362bf0-83e9-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/c/c3362bf0-83e9-11ee-9ada-6590fb922310.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a797e3a145bb0861e4b335456c8e86d3e348cf3 --- /dev/null +++ b/graph/incidents_graphml/c/c3362bf0-83e9-11ee-9ada-6590fb922310.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.174 + 100.64.17.174 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700075052 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c3362bf0-83e9-11ee-9ada-6590fb922310 + + + diff --git a/graph/incidents_graphml/c/c3395d20-1c97-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/c/c3395d20-1c97-11ee-b9c1-8f183b2e0424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd261060312f518bf8776bec8e965fff5d5cf4ef --- /dev/null +++ b/graph/incidents_graphml/c/c3395d20-1c97-11ee-b9c1-8f183b2e0424.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.124 + 100.64.5.124 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688714863 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3395d20-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714863 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3395d20-1c97-11ee-b9c1-8f183b2e0424 + + + diff --git a/graph/incidents_graphml/c/c3475fb0-e280-11ee-bdbd-61ca27aa8970.graphml b/graph/incidents_graphml/c/c3475fb0-e280-11ee-bdbd-61ca27aa8970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..023238f7fdfb8abc8f6c9bcbadfb6f9b078fc061 --- /dev/null +++ b/graph/incidents_graphml/c/c3475fb0-e280-11ee-bdbd-61ca27aa8970.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.60 + 100.64.13.60 + ["Exploiting Host"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.248 + 100.64.61.248 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.205 + 100.64.10.205 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.223 + 100.64.38.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.141 + 100.64.16.141 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.104 + 100.64.54.104 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.249 + 100.64.61.249 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.250 + 100.64.61.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.61 + 100.64.38.61 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.233 + 100.64.8.233 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.251 + 100.64.61.251 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.108 + USER-0015-1328.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.4 + 100.64.8.4 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.88 + 100.64.59.88 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.145 + 100.64.8.145 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + INCIDENT_LINK + 1710475315 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3475fb0-e280-11ee-bdbd-61ca27aa8970 + + + diff --git a/graph/incidents_graphml/c/c34a96c0-13d2-11ef-ac06-779f33eb9435.graphml b/graph/incidents_graphml/c/c34a96c0-13d2-11ef-ac06-779f33eb9435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa48cbbefadd7dd3cf8754f29ac1feb2353b2c45 --- /dev/null +++ b/graph/incidents_graphml/c/c34a96c0-13d2-11ef-ac06-779f33eb9435.graphml @@ -0,0 +1,753 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.147 + 100.64.50.147 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.1 + 100.64.15.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.89 + 100.64.49.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.176 + 100.64.13.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.117 + 100.64.61.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.204 + 100.64.59.204 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.93 + 100.64.56.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.118 + 100.64.61.118 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.1 + 100.64.3.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.236 + 100.64.38.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.119 + 100.64.61.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.14 + 100.64.2.14 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.120 + 100.64.61.120 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.121 + 100.64.61.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.122 + 100.64.61.122 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.38 + 100.64.24.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c34a96c0-13d2-11ef-ac06-779f33eb9435 + + + diff --git a/graph/incidents_graphml/c/c34d5d70-83e9-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/c/c34d5d70-83e9-11ee-9ada-6590fb922310.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18769cddc24761588b4d4f7eb0c675fc9e313d01 --- /dev/null +++ b/graph/incidents_graphml/c/c34d5d70-83e9-11ee-9ada-6590fb922310.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.174 + 100.64.17.174 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700075052 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c34d5d70-83e9-11ee-9ada-6590fb922310 + + + diff --git a/graph/incidents_graphml/c/c34e0f70-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c34e0f70-24b8-11ef-9f46-91603b00c012.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36b84e349019da1776b6c50224a09ac1800a0b37 --- /dev/null +++ b/graph/incidents_graphml/c/c34e0f70-24b8-11ef-9f46-91603b00c012.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.10 + 100.64.49.10 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717756144 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c34e0f70-24b8-11ef-9f46-91603b00c012 + + + diff --git a/graph/incidents_graphml/c/c352bc70-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/c/c352bc70-2435-11ee-bc29-cfb067a56058.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a222a78b601466819cec6df329259d83af487fd --- /dev/null +++ b/graph/incidents_graphml/c/c352bc70-2435-11ee-bc29-cfb067a56058.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.161 + 100.64.32.161 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1689552382 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c352bc70-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552382 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c352bc70-2435-11ee-bc29-cfb067a56058 + + + diff --git a/graph/incidents_graphml/c/c356bfd0-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c356bfd0-facf-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f436971b559b39fdb397875b989fc9ab443c22cb --- /dev/null +++ b/graph/incidents_graphml/c/c356bfd0-facf-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.1 + 100.64.30.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685000576 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c356bfd0-facf-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/c/c35aea70-13d2-11ef-ac06-779f33eb9435.graphml b/graph/incidents_graphml/c/c35aea70-13d2-11ef-ac06-779f33eb9435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..677a10589df28b59610ffb3ddad5e67b0b264631 --- /dev/null +++ b/graph/incidents_graphml/c/c35aea70-13d2-11ef-ac06-779f33eb9435.graphml @@ -0,0 +1,825 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.129 + 100.64.61.129 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.130 + 100.64.61.130 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.148 + 100.64.21.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.131 + 100.64.61.131 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.106 + 100.64.17.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.202 + 100.64.37.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.78 + 100.64.15.78 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.198 + 100.64.26.198 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.132 + 100.64.61.132 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.39 + 100.64.15.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.106 + 100.64.28.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.133 + 100.64.61.133 + [] + 0.25 + ["Precinct"] + + + HOST + 100.64.61.134 + 100.64.61.134 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.1 + 100.64.24.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.31 + 100.64.47.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.110 + 100.64.8.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.66 + 100.64.23.66 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.135 + 100.64.61.135 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + INCIDENT_LINK + 1715898141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c35aea70-13d2-11ef-ac06-779f33eb9435 + + + diff --git a/graph/incidents_graphml/c/c369d4d0-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c369d4d0-24b8-11ef-9f46-91603b00c012.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f151dfed48559a73b4a2595901b636a5dc9c0f8 --- /dev/null +++ b/graph/incidents_graphml/c/c369d4d0-24b8-11ef-9f46-91603b00c012.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.12 + 100.64.49.12 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717756144 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c369d4d0-24b8-11ef-9f46-91603b00c012 + + + diff --git a/graph/incidents_graphml/c/c36cf7f0-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c36cf7f0-6bc2-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cbf2d97d5d0cb09f23c4ec2fea486c00cca95b6 --- /dev/null +++ b/graph/incidents_graphml/c/c36cf7f0-6bc2-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.184 + 100.64.24.184 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697419474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c36cf7f0-6bc2-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/c/c36da330-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c36da330-facf-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e64562e05d99d0c6c81008ee218989c29acc5a4 --- /dev/null +++ b/graph/incidents_graphml/c/c36da330-facf-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.30.1 + 100.64.30.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685000576 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c36da330-facf-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/c/c379af60-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/c/c379af60-5bee-11ee-82a0-9da780b0dcc4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e4c55763c82af7625f04fcac30a17d51d5b693f --- /dev/null +++ b/graph/incidents_graphml/c/c379af60-5bee-11ee-82a0-9da780b0dcc4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.229 + 100.64.22.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695679153 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c379af60-5bee-11ee-82a0-9da780b0dcc4 + + + diff --git a/graph/incidents_graphml/c/c37cf530-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/c37cf530-ee30-11ec-9c18-c95a461c6308.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69144b9ca2a2816fe983c548c44e898202496c90 --- /dev/null +++ b/graph/incidents_graphml/c/c37cf530-ee30-11ec-9c18-c95a461c6308.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.115 + 100.64.13.115 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.88 + 100.64.72.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655465374 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c37cf530-ee30-11ec-9c18-c95a461c6308 + + + INCIDENT_LINK + 1655465374 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c37cf530-ee30-11ec-9c18-c95a461c6308 + + + diff --git a/graph/incidents_graphml/c/c37eab30-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c37eab30-6bc2-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6416d57ca52ce2930ea90834336cdded51acfe84 --- /dev/null +++ b/graph/incidents_graphml/c/c37eab30-6bc2-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.184 + 100.64.24.184 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697419474 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c37eab30-6bc2-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/c/c381c710-3c70-11ee-89e7-7976671c0f18.graphml b/graph/incidents_graphml/c/c381c710-3c70-11ee-89e7-7976671c0f18.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86e8178b83b06745e62509fb7aef72a5ecc7955b --- /dev/null +++ b/graph/incidents_graphml/c/c381c710-3c70-11ee-89e7-7976671c0f18.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.175 + 100.64.12.175 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1692216550 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c381c710-3c70-11ee-89e7-7976671c0f18 + + + INCIDENT_LINK + 1692216550 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c381c710-3c70-11ee-89e7-7976671c0f18 + + + diff --git a/graph/incidents_graphml/c/c3836720-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c3836720-8de5-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25f3f2bf11e0d4811ce719e2cf3fa3a3366573d4 --- /dev/null +++ b/graph/incidents_graphml/c/c3836720-8de5-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.116 + 100.64.64.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701172846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3836720-8de5-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/c3843aa0-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c3843aa0-24b8-11ef-9f46-91603b00c012.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a682f317aae990e2e3ad7e9cce9fd9214bc27f4c --- /dev/null +++ b/graph/incidents_graphml/c/c3843aa0-24b8-11ef-9f46-91603b00c012.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.159 + 100.64.32.159 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717756144 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c3843aa0-24b8-11ef-9f46-91603b00c012 + + + diff --git a/graph/incidents_graphml/c/c388f1a0-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/c/c388f1a0-5bee-11ee-82a0-9da780b0dcc4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32f03d5a66a1ed1aa7bc5210bcee12d72dfddc26 --- /dev/null +++ b/graph/incidents_graphml/c/c388f1a0-5bee-11ee-82a0-9da780b0dcc4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.229 + 100.64.22.229 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695679153 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c388f1a0-5bee-11ee-82a0-9da780b0dcc4 + + + diff --git a/graph/incidents_graphml/c/c389fc50-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/c/c389fc50-25e6-11ee-8760-d9b0ea984292.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea4f5e1429616f6c2364f82b8ab1ba5fcbe510b5 --- /dev/null +++ b/graph/incidents_graphml/c/c389fc50-25e6-11ee-8760-d9b0ea984292.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.239 + 100.64.64.239 + [] + 0.578125 + ["Precinct"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.240 + 100.64.64.240 + [] + 0.578125 + ["Precinct"] + + + HOST + 100.64.64.241 + 100.64.64.241 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.47 + 100.64.7.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.242 + 100.64.64.242 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689738354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c389fc50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c389fc50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c389fc50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c389fc50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c389fc50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c389fc50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c389fc50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c389fc50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c389fc50-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c389fc50-25e6-11ee-8760-d9b0ea984292 + + + diff --git a/graph/incidents_graphml/c/c38d0310-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c38d0310-6bc2-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5ae570dcb29760708d8e6bd14dce360459f4e3b --- /dev/null +++ b/graph/incidents_graphml/c/c38d0310-6bc2-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.136 + 100.64.14.136 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697419474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c38d0310-6bc2-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/c/c38e3340-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/c38e3340-ee30-11ec-9c18-c95a461c6308.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81df58c4e7ae64408a2758da67a5be860136e47d --- /dev/null +++ b/graph/incidents_graphml/c/c38e3340-ee30-11ec-9c18-c95a461c6308.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.93 + 100.64.73.93 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655465374 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c38e3340-ee30-11ec-9c18-c95a461c6308 + + + INCIDENT_LINK + 1655465374 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c38e3340-ee30-11ec-9c18-c95a461c6308 + + + diff --git a/graph/incidents_graphml/c/c39393c0-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c39393c0-8de5-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..73774b3da5b6602806c2c82da6359be22fa073a4 --- /dev/null +++ b/graph/incidents_graphml/c/c39393c0-8de5-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.116 + 100.64.64.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701172846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c39393c0-8de5-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/c395c2e0-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/c/c395c2e0-5bee-11ee-82a0-9da780b0dcc4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..638e6e9105d71429f9873c30bcea4a483b194094 --- /dev/null +++ b/graph/incidents_graphml/c/c395c2e0-5bee-11ee-82a0-9da780b0dcc4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.231 + 100.64.22.231 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695679153 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c395c2e0-5bee-11ee-82a0-9da780b0dcc4 + + + diff --git a/graph/incidents_graphml/c/c3972660-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c3972660-24b8-11ef-9f46-91603b00c012.graphml new file mode 100644 index 0000000000000000000000000000000000000000..804ba020eaedc3ff586deba074c3b7cd7853ab67 --- /dev/null +++ b/graph/incidents_graphml/c/c3972660-24b8-11ef-9f46-91603b00c012.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.14 + 100.64.49.14 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717756144 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c3972660-24b8-11ef-9f46-91603b00c012 + + + diff --git a/graph/incidents_graphml/c/c39b7470-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c39b7470-0cab-11ee-8985-55bb832fcc7f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c928f959118317b52ffa06cc497d71305e55f3a6 --- /dev/null +++ b/graph/incidents_graphml/c/c39b7470-0cab-11ee-8985-55bb832fcc7f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.15 + 100.64.74.15 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.68.219 + 100.64.68.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686964235 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c39b7470-0cab-11ee-8985-55bb832fcc7f + + + diff --git a/graph/incidents_graphml/c/c3a44bb0-fbb9-11ee-947f-6184d270644d.graphml b/graph/incidents_graphml/c/c3a44bb0-fbb9-11ee-947f-6184d270644d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc54ed332d3c067b3d7940fd625efe235ae7a801 --- /dev/null +++ b/graph/incidents_graphml/c/c3a44bb0-fbb9-11ee-947f-6184d270644d.graphml @@ -0,0 +1,791 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.194 + 100.64.41.194 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.102 + 100.64.20.102 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.249 + 100.64.64.249 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.69 + 100.64.17.69 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.85 + 100.64.17.85 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.5 + USER-0015-1287.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.129 + 100.64.41.129 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.250 + 100.64.64.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.161 + 100.64.60.161 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.251 + 100.64.64.251 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.252 + 100.64.64.252 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.253 + 100.64.64.253 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.254 + 100.64.64.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.255 + 100.64.64.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.67 + 100.64.23.67 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.1 + 100.64.65.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.1 + 100.64.65.1 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.66 + 100.64.18.66 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.119 + 100.64.22.119 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.2 + 100.64.65.2 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + INCIDENT_LINK + 1713248576 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3a44bb0-fbb9-11ee-947f-6184d270644d + + + diff --git a/graph/incidents_graphml/c/c3a4b700-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/c/c3a4b700-5bee-11ee-82a0-9da780b0dcc4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcb30580c618be13a87a5d4aeaceda0a1fa669ce --- /dev/null +++ b/graph/incidents_graphml/c/c3a4b700-5bee-11ee-82a0-9da780b0dcc4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.231 + 100.64.22.231 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695679153 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c3a4b700-5bee-11ee-82a0-9da780b0dcc4 + + + diff --git a/graph/incidents_graphml/c/c3b4e560-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c3b4e560-facf-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ab520635a26ca8aa74e8a1db45b5989161ce190 --- /dev/null +++ b/graph/incidents_graphml/c/c3b4e560-facf-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.2 + 100.64.30.2 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685000576 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3b4e560-facf-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/c/c3b61660-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/c3b61660-4ceb-11ee-b223-133fe64c82b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0b7f64557ce4361e9274a47647d862183f1979f --- /dev/null +++ b/graph/incidents_graphml/c/c3b61660-4ceb-11ee-b223-133fe64c82b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.122 + 100.64.36.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694028598 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c3b61660-4ceb-11ee-b223-133fe64c82b5 + + + diff --git a/graph/incidents_graphml/c/c3c42020-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/c3c42020-4ceb-11ee-b223-133fe64c82b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc600bdef098719d3d3e32eb1bb8be1cad800f00 --- /dev/null +++ b/graph/incidents_graphml/c/c3c42020-4ceb-11ee-b223-133fe64c82b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.122 + 100.64.36.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694028598 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c3c42020-4ceb-11ee-b223-133fe64c82b5 + + + diff --git a/graph/incidents_graphml/c/c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b.graphml b/graph/incidents_graphml/c/c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad89c00267586503cd26875e125d6d091c1045b4 --- /dev/null +++ b/graph/incidents_graphml/c/c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.71 + 100.64.17.71 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.120 + 100.64.5.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.17.72 + 100.64.17.72 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.73 + 100.64.17.73 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.74 + 100.64.17.74 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.13 + 100.64.2.13 + ["Exploiting Target","Exploiting Host"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.75 + 100.64.17.75 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + INCIDENT_LINK + 1714030260 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b + + + diff --git a/graph/incidents_graphml/c/c3c67c10-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c3c67c10-0cab-11ee-8985-55bb832fcc7f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4d00d1d65ca76186fcad1610afd120548e0122d --- /dev/null +++ b/graph/incidents_graphml/c/c3c67c10-0cab-11ee-8985-55bb832fcc7f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.120 + 100.64.8.120 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.216 + HOST-13084 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686964236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c3c67c10-0cab-11ee-8985-55bb832fcc7f + + + diff --git a/graph/incidents_graphml/c/c3cc3df0-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c3cc3df0-facf-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f066efaa3547efb55eb8dfc300508dd6259fbc1 --- /dev/null +++ b/graph/incidents_graphml/c/c3cc3df0-facf-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.30.2 + 100.64.30.2 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685000576 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c3cc3df0-facf-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/c/c3d30900-925f-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/c/c3d30900-925f-11ee-ac87-cff3005068fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3eaca7abad5d30265d2350a412aefaeec9eae5f --- /dev/null +++ b/graph/incidents_graphml/c/c3d30900-925f-11ee-ac87-cff3005068fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.34 + 100.64.6.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701665050 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c3d30900-925f-11ee-ac87-cff3005068fb + + + diff --git a/graph/incidents_graphml/c/c3e51d20-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c3e51d20-facf-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70e3aefa5e428fe173d0792c54a70289f87cdd7f --- /dev/null +++ b/graph/incidents_graphml/c/c3e51d20-facf-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.4 + 100.64.30.4 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685000577 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c3e51d20-facf-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/c/c3f03050-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c3f03050-50a8-11ee-9ae0-a3d3a7298a83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..946dc642c8f59e5b4101402b0addf7fc4aa1cc9c --- /dev/null +++ b/graph/incidents_graphml/c/c3f03050-50a8-11ee-9ae0-a3d3a7298a83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.191 + 100.64.19.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694439626 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c3f03050-50a8-11ee-9ae0-a3d3a7298a83 + + + diff --git a/graph/incidents_graphml/c/c3f8fa00-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/c/c3f8fa00-138b-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05f4843b1d39d77e2b5266ce3b6b42dd833ed614 --- /dev/null +++ b/graph/incidents_graphml/c/c3f8fa00-138b-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.161.94.89 + 10.161.94.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.74.79 + 100.64.74.79 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687720150 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3f8fa00-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720150 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3f8fa00-138b-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/c/c3fb6440-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c3fb6440-facf-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2cbfe69c66cd14f980b505b30bc2e9cf08d14c7d --- /dev/null +++ b/graph/incidents_graphml/c/c3fb6440-facf-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.30.4 + 100.64.30.4 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685000577 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c3fb6440-facf-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/c/c3fd9e70-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/c/c3fd9e70-182c-11ee-b591-f5bec484f8bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69a3db56bb61e6eb79c546b14f59c7fdcc92c924 --- /dev/null +++ b/graph/incidents_graphml/c/c3fd9e70-182c-11ee-b591-f5bec484f8bc.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.90.111 + 192.168.90.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.0.105 + 100.64.0.105 + ["Exploiting Target","Exploiting Host"] + 0.88134765625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 192.168.237.216 + 192.168.237.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 192.168.154.238 + 192.168.154.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + INCIDENT_LINK + 1688229104 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3fd9e70-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229104 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3fd9e70-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229104 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3fd9e70-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229104 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3fd9e70-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229104 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3fd9e70-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229104 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c3fd9e70-182c-11ee-b591-f5bec484f8bc + + + diff --git a/graph/incidents_graphml/c/c3fde3a0-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c3fde3a0-3517-11ee-8486-31c54e05c523.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d1866450b31e92a8c94993ea74091d05cf34248 --- /dev/null +++ b/graph/incidents_graphml/c/c3fde3a0-3517-11ee-8486-31c54e05c523.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.114 + USER-0015-1204.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408668 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c3fde3a0-3517-11ee-8486-31c54e05c523 + + + diff --git a/graph/incidents_graphml/c/c3ff7290-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c3ff7290-50a8-11ee-9ae0-a3d3a7298a83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b70336df5010aac3049b3b6018e665be06411962 --- /dev/null +++ b/graph/incidents_graphml/c/c3ff7290-50a8-11ee-9ae0-a3d3a7298a83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.191 + 100.64.19.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694439626 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c3ff7290-50a8-11ee-9ae0-a3d3a7298a83 + + + diff --git a/graph/incidents_graphml/c/c40f5110-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c40f5110-50a8-11ee-9ae0-a3d3a7298a83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c15a62ff2e65f70e5d1745b6f4d8745f2fe3013 --- /dev/null +++ b/graph/incidents_graphml/c/c40f5110-50a8-11ee-9ae0-a3d3a7298a83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.190 + 100.64.7.190 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694439626 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c40f5110-50a8-11ee-9ae0-a3d3a7298a83 + + + diff --git a/graph/incidents_graphml/c/c421e8d0-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/c421e8d0-fa48-11ee-a230-bfe539a81cf2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0053297e3e40261afd3a772ebbba7cf9875542e --- /dev/null +++ b/graph/incidents_graphml/c/c421e8d0-fa48-11ee-a230-bfe539a81cf2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.126 + 100.64.41.126 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713090093 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c421e8d0-fa48-11ee-a230-bfe539a81cf2 + + + diff --git a/graph/incidents_graphml/c/c42c3650-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/c42c3650-0da9-11ee-812a-a702327978d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24d25ec246dff939c36288d39f2db84879ae31d6 --- /dev/null +++ b/graph/incidents_graphml/c/c42c3650-0da9-11ee-812a-a702327978d7.graphml @@ -0,0 +1,689 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.118 + 100.64.25.118 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.119 + USER-0015-1254.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.120 + 100.64.25.120 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.121 + 100.64.25.121 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.34 + 100.64.14.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.122 + 100.64.25.122 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.123 + 100.64.25.123 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.124 + 100.64.25.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.125 + 100.64.25.125 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.126 + 100.64.25.126 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.127 + 100.64.25.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.128 + 100.64.25.128 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.248 + USER-0015-1255.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.93 + 100.64.9.93 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.47 + 100.64.8.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.248 + 100.64.17.248 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + INCIDENT_LINK + 1687073328 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c42c3650-0da9-11ee-812a-a702327978d7 + + + diff --git a/graph/incidents_graphml/c/c4303e40-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c4303e40-3517-11ee-8486-31c54e05c523.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c9ea4e7ba7569228cfc5b673f0a1f1b920702a3 --- /dev/null +++ b/graph/incidents_graphml/c/c4303e40-3517-11ee-8486-31c54e05c523.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408668 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4303e40-3517-11ee-8486-31c54e05c523 + + + INCIDENT_LINK + 1691408668 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4303e40-3517-11ee-8486-31c54e05c523 + + + diff --git a/graph/incidents_graphml/c/c4313c70-f766-11ee-a32a-474576cc2660.graphml b/graph/incidents_graphml/c/c4313c70-f766-11ee-a32a-474576cc2660.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cfc30b57a190176323c81469ec5590b2c79a5a4 --- /dev/null +++ b/graph/incidents_graphml/c/c4313c70-f766-11ee-a32a-474576cc2660.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.66.39.5 + HOST-12435 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","Vulnerability Management","Cortex XDR","Windows Active Directory"] + + + HOST + 100.64.70.123 + 100.64.70.123 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1712773124 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4313c70-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773124 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4313c70-f766-11ee-a32a-474576cc2660 + + + diff --git a/graph/incidents_graphml/c/c442f850-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/c/c442f850-1fe1-11ee-80ac-1985e110d782.graphml new file mode 100644 index 0000000000000000000000000000000000000000..23966e75fa36c522876ddd861e6157483ef43118 --- /dev/null +++ b/graph/incidents_graphml/c/c442f850-1fe1-11ee-80ac-1985e110d782.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.231 + 100.64.39.231 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689076501 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c442f850-1fe1-11ee-80ac-1985e110d782 + + + diff --git a/graph/incidents_graphml/c/c45742e0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/c/c45742e0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..845fbd42e44c3e0f5e01a4e4593e0eeb46e6bd2c --- /dev/null +++ b/graph/incidents_graphml/c/c45742e0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.90 + 100.64.78.90 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.159 + 100.64.1.159 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657069116 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c45742e0-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069116 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c45742e0-fcc6-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/c/c459e2b0-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/c/c459e2b0-f613-11ed-a3d6-ad85d59eee66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f54d758d5ca09303e61eb2ad9d19b667b9d83f8b --- /dev/null +++ b/graph/incidents_graphml/c/c459e2b0-f613-11ed-a3d6-ad85d59eee66.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.33 + 100.64.52.33 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.77.174 + 100.64.77.174 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.77.175 + 100.64.77.175 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1684480027 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c459e2b0-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480027 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c459e2b0-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480027 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c459e2b0-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480027 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c459e2b0-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480027 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c459e2b0-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480027 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c459e2b0-f613-11ed-a3d6-ad85d59eee66 + + + diff --git a/graph/incidents_graphml/c/c4606fc0-fbb9-11ee-947f-6184d270644d.graphml b/graph/incidents_graphml/c/c4606fc0-fbb9-11ee-947f-6184d270644d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6ba248b05a213de2a90df0ef898f3a88b132fe9 --- /dev/null +++ b/graph/incidents_graphml/c/c4606fc0-fbb9-11ee-947f-6184d270644d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.101 + 100.64.32.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713248577 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4606fc0-fbb9-11ee-947f-6184d270644d + + + diff --git a/graph/incidents_graphml/c/c4660f40-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/c/c4660f40-11c0-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..441d997b58b1a9aee7d924da2ed990b2e5aa37ab --- /dev/null +++ b/graph/incidents_graphml/c/c4660f40-11c0-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.111 + 100.64.82.111 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.125 + 100.64.71.125 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687523012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4660f40-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687523012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4660f40-11c0-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/c/c467c900-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c467c900-3517-11ee-8486-31c54e05c523.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e41c125a346fd7e88ae8d2189cbdd6901aad4e98 --- /dev/null +++ b/graph/incidents_graphml/c/c467c900-3517-11ee-8486-31c54e05c523.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408669 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c467c900-3517-11ee-8486-31c54e05c523 + + + diff --git a/graph/incidents_graphml/c/c46efd40-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c46efd40-50a8-11ee-9ae0-a3d3a7298a83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ece6a1d27f2236ed60b4de6c0aa8d32136861ec --- /dev/null +++ b/graph/incidents_graphml/c/c46efd40-50a8-11ee-9ae0-a3d3a7298a83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.103 + 100.64.27.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694439627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c46efd40-50a8-11ee-9ae0-a3d3a7298a83 + + + diff --git a/graph/incidents_graphml/c/c4763be0-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/c/c4763be0-11c0-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ada1400ed7ddd2cbb9b62ce38e8d92659b8f70f --- /dev/null +++ b/graph/incidents_graphml/c/c4763be0-11c0-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.112 + 100.64.82.112 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.3 + 100.64.72.3 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687523012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4763be0-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687523012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4763be0-11c0-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/c/c4766b60-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/c/c4766b60-f613-11ed-a3d6-ad85d59eee66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe0f79a23e4fcff66721c8884125eb5d70499739 --- /dev/null +++ b/graph/incidents_graphml/c/c4766b60-f613-11ed-a3d6-ad85d59eee66.graphml @@ -0,0 +1,617 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.71.130 + 100.64.71.130 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.15.246 + 100.64.15.246 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.65.32 + 100.64.65.32 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.100 + 100.64.71.100 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.74.72 + 100.64.74.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.14.48 + 100.64.14.48 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.176 + 100.64.77.176 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.177 + 100.64.77.177 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.178 + 100.64.77.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.255 + 100.64.70.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.73.58 + 100.64.73.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.13.89 + 100.64.13.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.72.52 + 100.64.72.52 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.236 + 100.64.75.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.4.90 + 100.64.4.90 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.77.179 + 100.64.77.179 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4766b60-f613-11ed-a3d6-ad85d59eee66 + + + diff --git a/graph/incidents_graphml/c/c4795b20-925f-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/c/c4795b20-925f-11ee-ac87-cff3005068fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7ab53cb7c5db271de2bae0e6b3d550774974099 --- /dev/null +++ b/graph/incidents_graphml/c/c4795b20-925f-11ee-ac87-cff3005068fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.186 + 100.64.66.186 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701665051 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4795b20-925f-11ee-ac87-cff3005068fb + + + diff --git a/graph/incidents_graphml/c/c47f6d80-1815-11ef-a290-d5e92fd7ebc0.graphml b/graph/incidents_graphml/c/c47f6d80-1815-11ef-a290-d5e92fd7ebc0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f6e7388ad0b20f8a37cfdf0e7483a12dc8f7692 --- /dev/null +++ b/graph/incidents_graphml/c/c47f6d80-1815-11ef-a290-d5e92fd7ebc0.graphml @@ -0,0 +1,177 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.127 + HOST-17376 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.46.208 + 172.16.46.208 + ["Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.128 + 100.64.87.128 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1716366724 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c47f6d80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366724 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c47f6d80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366724 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c47f6d80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366724 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c47f6d80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366724 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c47f6d80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366724 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c47f6d80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366724 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c47f6d80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366724 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c47f6d80-1815-11ef-a290-d5e92fd7ebc0 + + + diff --git a/graph/incidents_graphml/c/c47f75a0-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c47f75a0-0e89-11ee-9188-256b81e0b008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8536cfcb5f1a7ebdb848d2bc3efd03103714c3cf --- /dev/null +++ b/graph/incidents_graphml/c/c47f75a0-0e89-11ee-9188-256b81e0b008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.186 + 100.64.38.186 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687169536 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c47f75a0-0e89-11ee-9188-256b81e0b008 + + + diff --git a/graph/incidents_graphml/c/c480d790-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c480d790-50a8-11ee-9ae0-a3d3a7298a83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4fabd7827dde4c54a68687c63354847d38810e07 --- /dev/null +++ b/graph/incidents_graphml/c/c480d790-50a8-11ee-9ae0-a3d3a7298a83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.103 + 100.64.27.103 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694439627 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c480d790-50a8-11ee-9ae0-a3d3a7298a83 + + + diff --git a/graph/incidents_graphml/c/c48579b0-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/c/c48579b0-bcf3-11ed-9421-6db30872eff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..561c67af4d587b120b3113bb4c2c0df69abb54c8 --- /dev/null +++ b/graph/incidents_graphml/c/c48579b0-bcf3-11ed-9421-6db30872eff3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.171.156 + 192.168.171.156 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.40 + 100.64.86.40 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678199067 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c48579b0-bcf3-11ed-9421-6db30872eff3 + + + INCIDENT_LINK + 1678199067 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c48579b0-bcf3-11ed-9421-6db30872eff3 + + + diff --git a/graph/incidents_graphml/c/c486b6a0-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/c/c486b6a0-11c0-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe6836978a363c8d5ecd9f972dd64c41a02cc5a8 --- /dev/null +++ b/graph/incidents_graphml/c/c486b6a0-11c0-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.222 + 100.64.71.222 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687523012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c486b6a0-11c0-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687523012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c486b6a0-11c0-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/c/c48e2e60-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c48e2e60-facf-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c399fb3a2182a2ac515a5d32ba6464b925d7878d --- /dev/null +++ b/graph/incidents_graphml/c/c48e2e60-facf-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.220 + 100.64.16.220 + ["Exploiting Host","Exploiting Target"] + 0.983125 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685000578 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c48e2e60-facf-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/c/c48f9c50-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c48f9c50-3517-11ee-8486-31c54e05c523.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7765d2fb945f55633275264e2404ee5f67a0d30f --- /dev/null +++ b/graph/incidents_graphml/c/c48f9c50-3517-11ee-8486-31c54e05c523.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.149 + USER-0015-1235.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408669 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c48f9c50-3517-11ee-8486-31c54e05c523 + + + diff --git a/graph/incidents_graphml/c/c4905c00-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/c/c4905c00-f613-11ed-a3d6-ad85d59eee66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d90cccf26de703dfcd0296395ff966ba5d15f3ac --- /dev/null +++ b/graph/incidents_graphml/c/c4905c00-f613-11ed-a3d6-ad85d59eee66.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.254 + 100.64.17.254 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.180 + 100.64.77.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.77.181 + 100.64.77.181 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1684480028 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4905c00-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4905c00-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4905c00-f613-11ed-a3d6-ad85d59eee66 + + + INCIDENT_LINK + 1684480028 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4905c00-f613-11ed-a3d6-ad85d59eee66 + + + diff --git a/graph/incidents_graphml/c/c49067f0-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c49067f0-50a8-11ee-9ae0-a3d3a7298a83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88c2e98c28e4f57a38a13462d4fe85db9c512ee7 --- /dev/null +++ b/graph/incidents_graphml/c/c49067f0-50a8-11ee-9ae0-a3d3a7298a83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.105 + 100.64.27.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694439627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c49067f0-50a8-11ee-9ae0-a3d3a7298a83 + + + diff --git a/graph/incidents_graphml/c/c49bfe50-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c49bfe50-0e89-11ee-9188-256b81e0b008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8099d55497e1e043166f95467bc5aa18ff387e5 --- /dev/null +++ b/graph/incidents_graphml/c/c49bfe50-0e89-11ee-9188-256b81e0b008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.186 + 100.64.38.186 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687169536 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c49bfe50-0e89-11ee-9188-256b81e0b008 + + + diff --git a/graph/incidents_graphml/c/c49dbd40-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c49dbd40-789b-11ee-8d62-1fa49ad9521f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..879671bead3846757fe036754ba04b2edf14b3bf --- /dev/null +++ b/graph/incidents_graphml/c/c49dbd40-789b-11ee-8d62-1fa49ad9521f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.204 + 100.64.2.204 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698832091 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c49dbd40-789b-11ee-8d62-1fa49ad9521f + + + diff --git a/graph/incidents_graphml/c/c49dcf50-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c49dcf50-8a99-11ee-b145-63bb68632209.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d48a54397dd88d6895d0a68b2b57b8171c4b285e --- /dev/null +++ b/graph/incidents_graphml/c/c49dcf50-8a99-11ee-b145-63bb68632209.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.36 + 100.64.41.36 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700810352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c49dcf50-8a99-11ee-b145-63bb68632209 + + + diff --git a/graph/incidents_graphml/c/c4a52af0-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/c/c4a52af0-ed53-11ec-8964-796320a841f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8a17fb12a07f7110d3dca7cd35f3b74664e7faf --- /dev/null +++ b/graph/incidents_graphml/c/c4a52af0-ed53-11ec-8964-796320a841f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.51 + USER-0015-1783.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.175 + 100.64.79.175 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655370457 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4a52af0-ed53-11ec-8964-796320a841f1 + + + INCIDENT_LINK + 1655370457 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4a52af0-ed53-11ec-8964-796320a841f1 + + + diff --git a/graph/incidents_graphml/c/c4a5ed20-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c4a5ed20-6bc2-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b82bb35827645bd36535002c8c445461870ef8f --- /dev/null +++ b/graph/incidents_graphml/c/c4a5ed20-6bc2-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.127 + 100.64.62.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697419476 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4a5ed20-6bc2-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/c/c4a6d760-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4a6d760-6386-11ee-9eed-775092596c34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65d9cbe1c6198708b5da9f4ebc56f297b316f935 --- /dev/null +++ b/graph/incidents_graphml/c/c4a6d760-6386-11ee-9eed-775092596c34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.98 + 100.64.17.98 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696514097 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4a6d760-6386-11ee-9eed-775092596c34 + + + diff --git a/graph/incidents_graphml/c/c4a76c90-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c4a76c90-8454-11ee-ad04-df7d06c31c2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86ced43b8715ec37eb8af6b3d499dd5a40b459a4 --- /dev/null +++ b/graph/incidents_graphml/c/c4a76c90-8454-11ee-ad04-df7d06c31c2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.179 + 100.64.33.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700121010 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4a76c90-8454-11ee-ad04-df7d06c31c2e + + + diff --git a/graph/incidents_graphml/c/c4ae4a10-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c4ae4a10-8a99-11ee-b145-63bb68632209.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1b61c3352aa3c4ec399360ddd4dcaca46049e7e --- /dev/null +++ b/graph/incidents_graphml/c/c4ae4a10-8a99-11ee-b145-63bb68632209.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.254 + 100.64.3.254 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700810353 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4ae4a10-8a99-11ee-b145-63bb68632209 + + + diff --git a/graph/incidents_graphml/c/c4af61b0-3027-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/c/c4af61b0-3027-11ee-a433-a916fb2bb25a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c61ff5d961056de63c629f0ec3aca6a58455ecc --- /dev/null +++ b/graph/incidents_graphml/c/c4af61b0-3027-11ee-a433-a916fb2bb25a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.71 + 100.64.69.71 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.29.39 + 100.64.29.39 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690865785 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4af61b0-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865785 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4af61b0-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865785 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4af61b0-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865785 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4af61b0-3027-11ee-a433-a916fb2bb25a + + + diff --git a/graph/incidents_graphml/c/c4b24570-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c4b24570-0e89-11ee-9188-256b81e0b008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ebfd18a1b50e05719edabdbc6a0f1a6a1bd29cd --- /dev/null +++ b/graph/incidents_graphml/c/c4b24570-0e89-11ee-9188-256b81e0b008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.31 + 100.64.25.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687169536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4b24570-0e89-11ee-9188-256b81e0b008 + + + diff --git a/graph/incidents_graphml/c/c4b27020-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4b27020-6386-11ee-9eed-775092596c34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..796785c46159f867cd96e7db87ccbdfe367a74c4 --- /dev/null +++ b/graph/incidents_graphml/c/c4b27020-6386-11ee-9eed-775092596c34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.224 + 100.64.51.224 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696514097 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4b27020-6386-11ee-9eed-775092596c34 + + + diff --git a/graph/incidents_graphml/c/c4bfdda0-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4bfdda0-6386-11ee-9eed-775092596c34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b56359bd2732e656fdf4a66e6d52b62c0e014236 --- /dev/null +++ b/graph/incidents_graphml/c/c4bfdda0-6386-11ee-9eed-775092596c34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.224 + 100.64.51.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696514097 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4bfdda0-6386-11ee-9eed-775092596c34 + + + diff --git a/graph/incidents_graphml/c/c4c88c90-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c4c88c90-0e89-11ee-9188-256b81e0b008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf2466c2e2f778e8fbd22d4c681e765221a4425d --- /dev/null +++ b/graph/incidents_graphml/c/c4c88c90-0e89-11ee-9188-256b81e0b008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.31 + 100.64.25.31 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687169537 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4c88c90-0e89-11ee-9188-256b81e0b008 + + + diff --git a/graph/incidents_graphml/c/c4cc39b0-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4cc39b0-6386-11ee-9eed-775092596c34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b94ce0a4daefbb417d7fa0b25817fa7c18dbe36 --- /dev/null +++ b/graph/incidents_graphml/c/c4cc39b0-6386-11ee-9eed-775092596c34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.226 + 100.64.51.226 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696514097 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4cc39b0-6386-11ee-9eed-775092596c34 + + + diff --git a/graph/incidents_graphml/c/c4cd5d40-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/c/c4cd5d40-fcc6-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c387d82afc16555d64392d753871e25fce6b3b07 --- /dev/null +++ b/graph/incidents_graphml/c/c4cd5d40-fcc6-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.73 + 100.64.38.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.36 + 100.64.73.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657069117 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4cd5d40-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069117 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4cd5d40-fcc6-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/c/c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/c/c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f671f8b43ff9f0a23f60ced3c19908ceded93283 --- /dev/null +++ b/graph/incidents_graphml/c/c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.109 + USER-0015-1627.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.251 + 100.64.71.251 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.54.98 + 100.64.54.98 + ["Exploiting Target","Exploiting Host"] + 0.9634375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657069117 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069117 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069117 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657069117 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/c/c4d0ed40-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c4d0ed40-8a99-11ee-b145-63bb68632209.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f5d2428d4a8010b9ada06553aeae639483e6967 --- /dev/null +++ b/graph/incidents_graphml/c/c4d0ed40-8a99-11ee-b145-63bb68632209.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.38 + 100.64.41.38 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700810353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4d0ed40-8a99-11ee-b145-63bb68632209 + + + diff --git a/graph/incidents_graphml/c/c4d24510-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c4d24510-7459-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a054f87432b0516e8a8ab4be8dbf6627288e3e7 --- /dev/null +++ b/graph/incidents_graphml/c/c4d24510-7459-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.24 + 100.64.14.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698363939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4d24510-7459-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/c/c4da6a80-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4da6a80-6386-11ee-9eed-775092596c34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd2cf88594e615ce5abd89e28bee0a6be39ef0a1 --- /dev/null +++ b/graph/incidents_graphml/c/c4da6a80-6386-11ee-9eed-775092596c34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.226 + 100.64.51.226 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696514097 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4da6a80-6386-11ee-9eed-775092596c34 + + + diff --git a/graph/incidents_graphml/c/c4df9110-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c4df9110-3517-11ee-8486-31c54e05c523.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6052ba34d6d8e448c190e3cd8e03103a211771be --- /dev/null +++ b/graph/incidents_graphml/c/c4df9110-3517-11ee-8486-31c54e05c523.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.22 + 100.64.21.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408670 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4df9110-3517-11ee-8486-31c54e05c523 + + + diff --git a/graph/incidents_graphml/c/c4e221d0-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c4e221d0-1228-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b86cab475ddd293a39640f0a6046c0a56c12aa0 --- /dev/null +++ b/graph/incidents_graphml/c/c4e221d0-1228-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.213 + 100.64.80.213 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687567680 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4e221d0-1228-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/c/c4e49490-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c4e49490-7459-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86b8c0fb7c800d3dd84c626a53038e20696ed70e --- /dev/null +++ b/graph/incidents_graphml/c/c4e49490-7459-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.24 + 100.64.14.24 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698363940 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4e49490-7459-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/c/c4e90ce0-925f-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/c/c4e90ce0-925f-11ee-ac87-cff3005068fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5633ee8a4bc8498441b7b270dc5bbf7a09a2a632 --- /dev/null +++ b/graph/incidents_graphml/c/c4e90ce0-925f-11ee-ac87-cff3005068fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.188 + 100.64.66.188 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701665051 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4e90ce0-925f-11ee-ac87-cff3005068fb + + + diff --git a/graph/incidents_graphml/c/c4e9cc70-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c4e9cc70-8a99-11ee-b145-63bb68632209.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35059caa066e31970f3c3f4cdb0570b120f86442 --- /dev/null +++ b/graph/incidents_graphml/c/c4e9cc70-8a99-11ee-b145-63bb68632209.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.38 + 100.64.41.38 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700810353 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4e9cc70-8a99-11ee-b145-63bb68632209 + + + diff --git a/graph/incidents_graphml/c/c4ed1300-3150-11ee-9a81-45e5b946e7a5.graphml b/graph/incidents_graphml/c/c4ed1300-3150-11ee-9a81-45e5b946e7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f7ff57a2886c9f731c52ac6259ad7c82279bbfd --- /dev/null +++ b/graph/incidents_graphml/c/c4ed1300-3150-11ee-9a81-45e5b946e7a5.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.91 + 100.64.9.91 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.92 + 100.64.9.92 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.93 + 100.64.9.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.94 + 100.64.9.94 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690993346 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4ed1300-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993346 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4ed1300-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993346 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4ed1300-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993346 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4ed1300-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993346 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4ed1300-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993346 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4ed1300-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993346 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4ed1300-3150-11ee-9a81-45e5b946e7a5 + + + INCIDENT_LINK + 1690993346 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4ed1300-3150-11ee-9a81-45e5b946e7a5 + + + diff --git a/graph/incidents_graphml/c/c4f0d8b0-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4f0d8b0-6386-11ee-9eed-775092596c34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b2be9df6abb4b9da14415e97131f3bed35687ae --- /dev/null +++ b/graph/incidents_graphml/c/c4f0d8b0-6386-11ee-9eed-775092596c34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.228 + 100.64.51.228 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696514097 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4f0d8b0-6386-11ee-9eed-775092596c34 + + + diff --git a/graph/incidents_graphml/c/c4fa8bd0-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c4fa8bd0-1228-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54bbbaea381a651d711bc0a406b321ed123ed726 --- /dev/null +++ b/graph/incidents_graphml/c/c4fa8bd0-1228-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.216 + 100.64.80.216 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687567680 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c4fa8bd0-1228-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/c/c4fd0a10-925f-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/c/c4fd0a10-925f-11ee-ac87-cff3005068fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c87f2118e4b0bee64f4b5ff3fa5ca21a8b5f150a --- /dev/null +++ b/graph/incidents_graphml/c/c4fd0a10-925f-11ee-ac87-cff3005068fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.188 + 100.64.66.188 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701665052 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fd0a10-925f-11ee-ac87-cff3005068fb + + + diff --git a/graph/incidents_graphml/c/c4fdcfc0-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c4fdcfc0-50a8-11ee-9ae0-a3d3a7298a83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00bc9f3c74e63676c161c3e374fa4d26e1c87042 --- /dev/null +++ b/graph/incidents_graphml/c/c4fdcfc0-50a8-11ee-9ae0-a3d3a7298a83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694439628 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c4fdcfc0-50a8-11ee-9ae0-a3d3a7298a83 + + + diff --git a/graph/incidents_graphml/c/c4fe3c30-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c4fe3c30-6665-11ee-9e3e-f968222332ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f75e3155c7730e453dbbc00f4526eb078f4b90b --- /dev/null +++ b/graph/incidents_graphml/c/c4fe3c30-6665-11ee-9e3e-f968222332ec.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.18 + 100.64.7.18 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.129 + 100.64.35.129 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.216 + 100.64.14.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.129 + 100.64.57.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.144 + 100.64.55.144 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.187 + 100.64.52.187 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.130 + 100.64.57.130 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.131 + 100.64.57.131 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.132 + 100.64.57.132 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.133 + 100.64.57.133 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.134 + 100.64.57.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.135 + 100.64.57.135 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.136 + 100.64.57.136 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.137 + USER-0015-1423.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.8 + 100.64.12.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.138 + 100.64.57.138 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.139 + 100.64.57.139 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.140 + 100.64.57.140 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.72 + 100.64.15.72 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + INCIDENT_LINK + 1696829777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c4fe3c30-6665-11ee-9e3e-f968222332ec + + + diff --git a/graph/incidents_graphml/c/c4ff3090-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4ff3090-6386-11ee-9eed-775092596c34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e7910a1868bc75f4bd6f1e83761f21a4c20a72d --- /dev/null +++ b/graph/incidents_graphml/c/c4ff3090-6386-11ee-9eed-775092596c34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.228 + 100.64.51.228 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696514097 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c4ff3090-6386-11ee-9eed-775092596c34 + + + diff --git a/graph/incidents_graphml/c/c4ffc570-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c4ffc570-8a99-11ee-b145-63bb68632209.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8e2764d18405a7dad7edccff4836a12f8bbd010 --- /dev/null +++ b/graph/incidents_graphml/c/c4ffc570-8a99-11ee-b145-63bb68632209.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.40 + 100.64.41.40 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700810353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c4ffc570-8a99-11ee-b145-63bb68632209 + + + diff --git a/graph/incidents_graphml/c/c501b020-a2d5-11ee-8541-6f03abc6c851.graphml b/graph/incidents_graphml/c/c501b020-a2d5-11ee-8541-6f03abc6c851.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18051c7a1f1e0e94e6c64fa5067aa185a0eaa011 --- /dev/null +++ b/graph/incidents_graphml/c/c501b020-a2d5-11ee-8541-6f03abc6c851.graphml @@ -0,0 +1,279 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.222 + 100.64.29.222 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.223 + 100.64.29.223 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.72 + 100.64.10.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.224 + 100.64.29.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.65 + 100.64.8.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.225 + 100.64.29.225 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.54 + 100.64.18.54 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474951 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c501b020-a2d5-11ee-8541-6f03abc6c851 + + + diff --git a/graph/incidents_graphml/c/c504a540-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c504a540-3517-11ee-8486-31c54e05c523.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c670b3866a04f079440db4e92ceab98612e2362 --- /dev/null +++ b/graph/incidents_graphml/c/c504a540-3517-11ee-8486-31c54e05c523.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.22 + 100.64.21.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408670 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c504a540-3517-11ee-8486-31c54e05c523 + + + diff --git a/graph/incidents_graphml/c/c50a7810-8704-11ed-bb4c-dd95bc70531e.graphml b/graph/incidents_graphml/c/c50a7810-8704-11ed-bb4c-dd95bc70531e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abf8b90e5981c756904ef81922887388526b0ab1 --- /dev/null +++ b/graph/incidents_graphml/c/c50a7810-8704-11ed-bb4c-dd95bc70531e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.106.93.7 + 10.106.93.7 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1672269007 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c50a7810-8704-11ed-bb4c-dd95bc70531e + + + diff --git a/graph/incidents_graphml/c/c50b7bc0-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c50b7bc0-1228-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..122a886e6fe7fdf1bf17d6682c884807a4cfeb12 --- /dev/null +++ b/graph/incidents_graphml/c/c50b7bc0-1228-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.216 + 100.64.80.216 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687567681 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c50b7bc0-1228-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/c/c50dfc60-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c50dfc60-50a8-11ee-9ae0-a3d3a7298a83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ccd3f0c10f9d305bca74a61507e0b2e50096115 --- /dev/null +++ b/graph/incidents_graphml/c/c50dfc60-50a8-11ee-9ae0-a3d3a7298a83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.107 + 100.64.27.107 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694439628 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c50dfc60-50a8-11ee-9ae0-a3d3a7298a83 + + + diff --git a/graph/incidents_graphml/c/c50e48a0-8704-11ed-bb4c-dd95bc70531e.graphml b/graph/incidents_graphml/c/c50e48a0-8704-11ed-bb4c-dd95bc70531e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..941d087117dfc09f28387d7e16a226fde2c1c9d6 --- /dev/null +++ b/graph/incidents_graphml/c/c50e48a0-8704-11ed-bb4c-dd95bc70531e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.106.93.7 + 10.106.93.7 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1672269007 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c50e48a0-8704-11ed-bb4c-dd95bc70531e + + + diff --git a/graph/incidents_graphml/c/c5130390-8704-11ed-bb4c-dd95bc70531e.graphml b/graph/incidents_graphml/c/c5130390-8704-11ed-bb4c-dd95bc70531e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9c7c7cd1a51a6423f3b2aecf996b01219d3cdeb --- /dev/null +++ b/graph/incidents_graphml/c/c5130390-8704-11ed-bb4c-dd95bc70531e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.107 + 100.64.83.107 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.106.93.7 + 10.106.93.7 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1672269007 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5130390-8704-11ed-bb4c-dd95bc70531e + + + diff --git a/graph/incidents_graphml/c/c5167d20-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c5167d20-41dc-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ae6f05edba838c7100dc1a9f092f2a9b8e01498 --- /dev/null +++ b/graph/incidents_graphml/c/c5167d20-41dc-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.224 + 100.64.67.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692812695 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5167d20-41dc-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/c/c5182f70-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c5182f70-8a99-11ee-b145-63bb68632209.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8cb4efd47356a557be9d4258cbb35e2eb2e720b --- /dev/null +++ b/graph/incidents_graphml/c/c5182f70-8a99-11ee-b145-63bb68632209.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.40 + 100.64.41.40 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700810353 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c5182f70-8a99-11ee-b145-63bb68632209 + + + diff --git a/graph/incidents_graphml/c/c518a8e0-8704-11ed-bb4c-dd95bc70531e.graphml b/graph/incidents_graphml/c/c518a8e0-8704-11ed-bb4c-dd95bc70531e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f47be0d4da931c0df680ce26e8bbc868f8b8a6a --- /dev/null +++ b/graph/incidents_graphml/c/c518a8e0-8704-11ed-bb4c-dd95bc70531e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.106.93.7 + 10.106.93.7 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.107 + 100.64.83.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1672269007 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c518a8e0-8704-11ed-bb4c-dd95bc70531e + + + diff --git a/graph/incidents_graphml/c/c51baf40-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c51baf40-6665-11ee-9e3e-f968222332ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9f924caf4b07287e03848963d2f361da81d0178 --- /dev/null +++ b/graph/incidents_graphml/c/c51baf40-6665-11ee-9e3e-f968222332ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.197 + 100.64.22.197 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696829778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c51baf40-6665-11ee-9e3e-f968222332ec + + + diff --git a/graph/incidents_graphml/c/c51db3d0-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c51db3d0-50a8-11ee-9ae0-a3d3a7298a83.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d23efae0db9787f5f07ec0a8117b963a2d852fc8 --- /dev/null +++ b/graph/incidents_graphml/c/c51db3d0-50a8-11ee-9ae0-a3d3a7298a83.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.107 + 100.64.27.107 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694439628 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c51db3d0-50a8-11ee-9ae0-a3d3a7298a83 + + + diff --git a/graph/incidents_graphml/c/c51e1960-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c51e1960-1228-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6364ad8205a43b8f08d50ef4e3cf65b6dadcec66 --- /dev/null +++ b/graph/incidents_graphml/c/c51e1960-1228-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.218 + 100.64.80.218 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.246 + 100.64.76.246 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.219 + 100.64.80.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687567681 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c51e1960-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567681 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c51e1960-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567681 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c51e1960-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567681 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c51e1960-1228-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/c/c5296ae0-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c5296ae0-6665-11ee-9e3e-f968222332ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b14c9f220766c17995372f0323bfa5fb4efa7ca2 --- /dev/null +++ b/graph/incidents_graphml/c/c5296ae0-6665-11ee-9e3e-f968222332ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.197 + 100.64.22.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696829778 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c5296ae0-6665-11ee-9e3e-f968222332ec + + + diff --git a/graph/incidents_graphml/c/c52dbbc0-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c52dbbc0-8de5-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1e898c502dd684a1d669b291e5de9e9023858d2 --- /dev/null +++ b/graph/incidents_graphml/c/c52dbbc0-8de5-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.118 + 100.64.64.118 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701172849 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c52dbbc0-8de5-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/c53aa210-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c53aa210-1228-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9e9b0cb1f1c9e7ef1b4049b3f4b4e78bc6babee --- /dev/null +++ b/graph/incidents_graphml/c/c53aa210-1228-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.217 + 100.64.80.217 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687567681 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c53aa210-1228-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/c/c53d4c20-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c53d4c20-8de5-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6649bb8f7724856adc08c99516885c320d8b9bb --- /dev/null +++ b/graph/incidents_graphml/c/c53d4c20-8de5-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.118 + 100.64.64.118 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701172849 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c53d4c20-8de5-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/c5538890-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c5538890-3517-11ee-8486-31c54e05c523.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bee620f837f7f8a2db1f633af7709f1e76fea988 --- /dev/null +++ b/graph/incidents_graphml/c/c5538890-3517-11ee-8486-31c54e05c523.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.169 + 100.64.22.169 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408670 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c5538890-3517-11ee-8486-31c54e05c523 + + + diff --git a/graph/incidents_graphml/c/c55a8620-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c55a8620-1228-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58c4b2663304cd218b2ec644aec23aad647aca5a --- /dev/null +++ b/graph/incidents_graphml/c/c55a8620-1228-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.217 + 100.64.80.217 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687567681 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c55a8620-1228-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/c/c562f7d0-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c562f7d0-0e89-11ee-9188-256b81e0b008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0675fe4a5379361bd018402a79be875804e6322 --- /dev/null +++ b/graph/incidents_graphml/c/c562f7d0-0e89-11ee-9188-256b81e0b008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.188 + 100.64.38.188 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687169538 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c562f7d0-0e89-11ee-9188-256b81e0b008 + + + diff --git a/graph/incidents_graphml/c/c5692d60-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/c/c5692d60-be7c-11ed-9564-3d773f19984f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..436999b83e7194069189778831febb98429f3523 --- /dev/null +++ b/graph/incidents_graphml/c/c5692d60-be7c-11ed-9564-3d773f19984f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.2 + 100.64.97.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1678367861 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5692d60-be7c-11ed-9564-3d773f19984f + + + diff --git a/graph/incidents_graphml/c/c56c88c0-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/c/c56c88c0-be7c-11ed-9564-3d773f19984f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c448e1555c93e51bbb001b2050228b29dfc0d5b --- /dev/null +++ b/graph/incidents_graphml/c/c56c88c0-be7c-11ed-9564-3d773f19984f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.97.2 + 100.64.97.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678367861 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c56c88c0-be7c-11ed-9564-3d773f19984f + + + diff --git a/graph/incidents_graphml/c/c5762bc0-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c5762bc0-3517-11ee-8486-31c54e05c523.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4637b2f5d4f4562eab400a5d9139dc610409a4f4 --- /dev/null +++ b/graph/incidents_graphml/c/c5762bc0-3517-11ee-8486-31c54e05c523.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.169 + 100.64.22.169 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408671 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c5762bc0-3517-11ee-8486-31c54e05c523 + + + diff --git a/graph/incidents_graphml/c/c576e470-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/c/c576e470-1fe1-11ee-80ac-1985e110d782.graphml new file mode 100644 index 0000000000000000000000000000000000000000..860eed79ba89f185947edb4cf37eebc088428a0a --- /dev/null +++ b/graph/incidents_graphml/c/c576e470-1fe1-11ee-80ac-1985e110d782.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.48 + 100.64.57.48 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689076503 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c576e470-1fe1-11ee-80ac-1985e110d782 + + + diff --git a/graph/incidents_graphml/c/c578c650-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c578c650-8454-11ee-ad04-df7d06c31c2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af1b780ca464dcf4e112f00386c02b858aab85e3 --- /dev/null +++ b/graph/incidents_graphml/c/c578c650-8454-11ee-ad04-df7d06c31c2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.181 + 100.64.33.181 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700121012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c578c650-8454-11ee-ad04-df7d06c31c2e + + + diff --git a/graph/incidents_graphml/c/c5799290-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/c/c5799290-ab6c-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ab9c48414440616cd95532c30061ee810104557 --- /dev/null +++ b/graph/incidents_graphml/c/c5799290-ab6c-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.121 + 100.64.32.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1676271917 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5799290-ab6c-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/c/c57d0920-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c57d0920-6665-11ee-9e3e-f968222332ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d0865e1d0adbf2c2d783e2f18a21aa26a971229 --- /dev/null +++ b/graph/incidents_graphml/c/c57d0920-6665-11ee-9e3e-f968222332ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.153 + 100.64.57.153 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696829778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c57d0920-6665-11ee-9e3e-f968222332ec + + + diff --git a/graph/incidents_graphml/c/c57f10d0-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/c/c57f10d0-ab6c-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94da928a85f89079929af051dd28a45bf616a21d --- /dev/null +++ b/graph/incidents_graphml/c/c57f10d0-ab6c-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.32.121 + 100.64.32.121 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676271917 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c57f10d0-ab6c-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/c/c585dcb0-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/c/c585dcb0-0d16-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cb35d97c9c5ef89e6bcff275b2beedad0930df2 --- /dev/null +++ b/graph/incidents_graphml/c/c585dcb0-0d16-11ee-9392-932bfd273540.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.178 + 100.64.72.178 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.46.36 + 100.64.46.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687010195 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c585dcb0-0d16-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687010195 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c585dcb0-0d16-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/c/c58bd920-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c58bd920-8454-11ee-ad04-df7d06c31c2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06119aed81a0d870e7792140370387ba67ca00cd --- /dev/null +++ b/graph/incidents_graphml/c/c58bd920-8454-11ee-ad04-df7d06c31c2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.181 + 100.64.33.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700121012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c58bd920-8454-11ee-ad04-df7d06c31c2e + + + diff --git a/graph/incidents_graphml/c/c58ca390-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/c/c58ca390-95ae-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..932e295455613866a8027321b8c4dfaff40fa0a0 --- /dev/null +++ b/graph/incidents_graphml/c/c58ca390-95ae-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.172 + 100.64.28.172 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.240 + 100.64.71.240 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1673881338 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c58ca390-95ae-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673881338 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c58ca390-95ae-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/c/c5909ec0-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/c5909ec0-2607-11ee-ad88-fb76ca0617eb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98bc7473ec0905cd90e9124377a63b07221983c7 --- /dev/null +++ b/graph/incidents_graphml/c/c5909ec0-2607-11ee-ad88-fb76ca0617eb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.109 + 100.64.7.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689752531 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5909ec0-2607-11ee-ad88-fb76ca0617eb + + + diff --git a/graph/incidents_graphml/c/c5914500-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c5914500-789b-11ee-8d62-1fa49ad9521f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1919b96d9baa4b7675cba8e1bf88729797619358 --- /dev/null +++ b/graph/incidents_graphml/c/c5914500-789b-11ee-8d62-1fa49ad9521f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.146 + 100.64.30.146 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698832092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5914500-789b-11ee-8d62-1fa49ad9521f + + + diff --git a/graph/incidents_graphml/c/c594d6e0-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c594d6e0-6665-11ee-9e3e-f968222332ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..75bbdc238aede3e5190167a690429635807e6813 --- /dev/null +++ b/graph/incidents_graphml/c/c594d6e0-6665-11ee-9e3e-f968222332ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.153 + 100.64.57.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696829778 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c594d6e0-6665-11ee-9e3e-f968222332ec + + + diff --git a/graph/incidents_graphml/c/c597fc70-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c597fc70-8d7b-11ee-94d2-bbe9f432e5f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2ec1621bd499e2b1db88e25df1e77fb469c9f66 --- /dev/null +++ b/graph/incidents_graphml/c/c597fc70-8d7b-11ee-94d2-bbe9f432e5f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.149 + 100.64.56.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701127323 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c597fc70-8d7b-11ee-94d2-bbe9f432e5f6 + + + diff --git a/graph/incidents_graphml/c/c59a7f20-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c59a7f20-8454-11ee-ad04-df7d06c31c2e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24bcf990a574548489b09fe45fe10d90ba863ae4 --- /dev/null +++ b/graph/incidents_graphml/c/c59a7f20-8454-11ee-ad04-df7d06c31c2e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.183 + 100.64.33.183 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700121012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c59a7f20-8454-11ee-ad04-df7d06c31c2e + + + diff --git a/graph/incidents_graphml/c/c59c5160-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c59c5160-3517-11ee-8486-31c54e05c523.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d6eec1149800333b796f5ace3151e78879a234c --- /dev/null +++ b/graph/incidents_graphml/c/c59c5160-3517-11ee-8486-31c54e05c523.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.197 + 100.64.22.197 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408671 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c59c5160-3517-11ee-8486-31c54e05c523 + + + diff --git a/graph/incidents_graphml/c/c5a274d0-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/c/c5a274d0-182c-11ee-b591-f5bec484f8bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e1a5997f561c65bd19854edd1e9054e1f583248 --- /dev/null +++ b/graph/incidents_graphml/c/c5a274d0-182c-11ee-b591-f5bec484f8bc.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.80 + 100.64.73.80 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.81 + 100.64.73.81 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.82 + 100.64.73.82 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.22.68 + USER-0015-1652.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.3.153 + 100.64.3.153 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.83 + 100.64.73.83 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.7.183 + 100.64.7.183 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.84 + 100.64.73.84 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + INCIDENT_LINK + 1688229106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a274d0-182c-11ee-b591-f5bec484f8bc + + + diff --git a/graph/incidents_graphml/c/c5a32ec0-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c5a32ec0-6665-11ee-9e3e-f968222332ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0c739f39f9cc8464f7a52caccbe587fd8bbf146 --- /dev/null +++ b/graph/incidents_graphml/c/c5a32ec0-6665-11ee-9e3e-f968222332ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.161 + 100.64.15.161 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696829778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c5a32ec0-6665-11ee-9e3e-f968222332ec + + + diff --git a/graph/incidents_graphml/c/c5a35e70-305b-11ef-89a2-c78d159172f4.graphml b/graph/incidents_graphml/c/c5a35e70-305b-11ef-89a2-c78d159172f4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd50aa1d821125404fa6cc74ee4c3802acf44780 --- /dev/null +++ b/graph/incidents_graphml/c/c5a35e70-305b-11ef-89a2-c78d159172f4.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.48 + 100.64.15.48 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.49 + 100.64.15.49 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.50 + 100.64.15.50 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.51 + 100.64.15.51 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.52 + 100.64.15.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.53 + 100.64.15.53 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.54 + 100.64.15.54 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.55 + 100.64.15.55 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + INCIDENT_LINK + 1719035618 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c5a35e70-305b-11ef-89a2-c78d159172f4 + + + diff --git a/graph/incidents_graphml/c/c5a91b50-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c5a91b50-1228-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59ed7ac6fedb20daeb5d4dd5adc00e28f5263ed2 --- /dev/null +++ b/graph/incidents_graphml/c/c5a91b50-1228-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.220 + 100.64.80.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687567682 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c5a91b50-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c5a91b50-1228-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/c/c5b09c40-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c5b09c40-6665-11ee-9e3e-f968222332ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5854ed63441168b09d8bfa2fdb23a2aeda4d0160 --- /dev/null +++ b/graph/incidents_graphml/c/c5b09c40-6665-11ee-9e3e-f968222332ec.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.161 + 100.64.15.161 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696829779 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c5b09c40-6665-11ee-9e3e-f968222332ec + + + diff --git a/graph/incidents_graphml/c/c5b4e4e0-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/c5b4e4e0-fa48-11ee-a230-bfe539a81cf2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77bc447a35d9ab64f56585026ad0440002772cdb --- /dev/null +++ b/graph/incidents_graphml/c/c5b4e4e0-fa48-11ee-a230-bfe539a81cf2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.128 + 100.64.41.128 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713090095 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c5b4e4e0-fa48-11ee-a230-bfe539a81cf2 + + + diff --git a/graph/incidents_graphml/c/c5bb0a20-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/c5bb0a20-2607-11ee-ad88-fb76ca0617eb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..646e1098f2b71295c323ace03b2b84dd30de655f --- /dev/null +++ b/graph/incidents_graphml/c/c5bb0a20-2607-11ee-ad88-fb76ca0617eb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.36 + 100.64.30.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689752532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c5bb0a20-2607-11ee-ad88-fb76ca0617eb + + + diff --git a/graph/incidents_graphml/c/c5bdeb80-3027-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/c/c5bdeb80-3027-11ee-a433-a916fb2bb25a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8b29be7b9045cdfd9760e5fa594ebac30f73bd1 --- /dev/null +++ b/graph/incidents_graphml/c/c5bdeb80-3027-11ee-a433-a916fb2bb25a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.10 + 100.64.37.10 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1690865787 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5bdeb80-3027-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865787 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5bdeb80-3027-11ee-a433-a916fb2bb25a + + + diff --git a/graph/incidents_graphml/c/c5c93f20-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c5c93f20-7902-11ee-aeda-45f788b28e25.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e155212fbb9e26c4b3448b57d45978b3fe0253e --- /dev/null +++ b/graph/incidents_graphml/c/c5c93f20-7902-11ee-aeda-45f788b28e25.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.243 + 100.64.11.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698876331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5c93f20-7902-11ee-aeda-45f788b28e25 + + + diff --git a/graph/incidents_graphml/c/c5cb9ec0-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c5cb9ec0-3517-11ee-8486-31c54e05c523.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eeb2c6ce14359e910de5c1910362d26ab3154e5a --- /dev/null +++ b/graph/incidents_graphml/c/c5cb9ec0-3517-11ee-8486-31c54e05c523.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.197 + 100.64.22.197 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408671 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c5cb9ec0-3517-11ee-8486-31c54e05c523 + + + diff --git a/graph/incidents_graphml/c/c5d17850-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/c5d17850-2607-11ee-ad88-fb76ca0617eb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a20211f25568b033032524c425adf3cfaa792cb --- /dev/null +++ b/graph/incidents_graphml/c/c5d17850-2607-11ee-ad88-fb76ca0617eb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.176 + 100.64.61.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689752532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5d17850-2607-11ee-ad88-fb76ca0617eb + + + diff --git a/graph/incidents_graphml/c/c5d8f690-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c5d8f690-7902-11ee-aeda-45f788b28e25.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99c8f65057c8921be780eb87963f8f6028bca479 --- /dev/null +++ b/graph/incidents_graphml/c/c5d8f690-7902-11ee-aeda-45f788b28e25.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698876331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c5d8f690-7902-11ee-aeda-45f788b28e25 + + + diff --git a/graph/incidents_graphml/c/c5e26c30-ebae-11ec-9bb1-995ea4635eee.graphml b/graph/incidents_graphml/c/c5e26c30-ebae-11ec-9bb1-995ea4635eee.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70561ad0bb63db4d96f793a9314a18e79b0d8b1b --- /dev/null +++ b/graph/incidents_graphml/c/c5e26c30-ebae-11ec-9bb1-995ea4635eee.graphml @@ -0,0 +1,755 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.166 + 100.64.3.166 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.67 + 100.64.72.67 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.157 + USER-0015-1738.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.114 + 100.64.74.114 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.62.69 + 100.64.62.69 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.158 + 100.64.76.158 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.158 + USER-0015-1647.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.23.49 + 100.64.23.49 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.31 + 100.64.75.31 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.58 + USER-0015-1739.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.159 + 100.64.76.159 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.196 + 100.64.72.196 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.160 + HOST-14167 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.161 + 100.64.76.161 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.162 + 100.64.76.162 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.37 + USER-0015-1666.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.163 + 100.64.76.163 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.33 + USER-0015-1618.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.164 + 100.64.76.164 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.165 + 100.64.76.165 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.82 + 100.64.71.82 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + INCIDENT_LINK + 1655189641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e26c30-ebae-11ec-9bb1-995ea4635eee + + + diff --git a/graph/incidents_graphml/c/c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf.graphml b/graph/incidents_graphml/c/c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b960bb1e096e978ba4816fc194bce397500a36eb --- /dev/null +++ b/graph/incidents_graphml/c/c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.153 + 100.64.94.153 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.10.38 + 100.64.10.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.154 + USER-0015-2119.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.155 + 100.64.94.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.156 + 100.64.94.156 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714983317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf + + + diff --git a/graph/incidents_graphml/c/c5e3c610-6769-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/c/c5e3c610-6769-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8941fe08708a046499a27cbac539fa8ba5a5f4d0 --- /dev/null +++ b/graph/incidents_graphml/c/c5e3c610-6769-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.5 + 100.64.34.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696941448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c5e3c610-6769-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/c/c5e580e0-93b5-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/c/c5e580e0-93b5-11ee-ad07-e3190f846a2a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..322538ad6c4e1834d5184cfe008f5250ca5c9432 --- /dev/null +++ b/graph/incidents_graphml/c/c5e580e0-93b5-11ee-ad07-e3190f846a2a.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.248 + 100.64.68.248 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB","Azure Security"] + + + HOST + 100.64.13.187 + 100.64.13.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.8.84 + 100.64.8.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1701811941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e580e0-93b5-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701811941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e580e0-93b5-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701811941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e580e0-93b5-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701811941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e580e0-93b5-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701811941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e580e0-93b5-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701811941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c5e580e0-93b5-11ee-ad07-e3190f846a2a + + + diff --git a/graph/incidents_graphml/c/c6043d20-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c6043d20-8a99-11ee-b145-63bb68632209.graphml new file mode 100644 index 0000000000000000000000000000000000000000..415b4cc2c180e0000c9e8d2964ea282336152910 --- /dev/null +++ b/graph/incidents_graphml/c/c6043d20-8a99-11ee-b145-63bb68632209.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.42 + 100.64.41.42 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700810355 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6043d20-8a99-11ee-b145-63bb68632209 + + + diff --git a/graph/incidents_graphml/c/c6054750-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/c/c6054750-2ebf-11ee-9131-1117bdeaaaa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85c5fee41598e989a1b8f9e639cf152a97a71594 --- /dev/null +++ b/graph/incidents_graphml/c/c6054750-2ebf-11ee-9131-1117bdeaaaa3.graphml @@ -0,0 +1,437 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.118 + 100.64.72.118 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.119 + 100.64.72.119 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.120 + 100.64.72.120 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.121 + 100.64.72.121 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.28.45 + 100.64.28.45 + ["Exploiting Host","Exploiting Target"] + 0.68359375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.122 + 100.64.72.122 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.123 + 100.64.72.123 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.16.144 + 100.64.16.144 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.124 + 100.64.72.124 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.237 + 100.64.71.237 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.37.146 + 100.64.37.146 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.63.7 + 100.64.63.7 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6054750-2ebf-11ee-9131-1117bdeaaaa3 + + + diff --git a/graph/incidents_graphml/c/c6059e20-6093-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/c/c6059e20-6093-11ee-a31b-270f2d0ccd3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7901f9e72aae881c006b1397cab609c596059ba --- /dev/null +++ b/graph/incidents_graphml/c/c6059e20-6093-11ee-a31b-270f2d0ccd3d.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.203 + 100.64.23.203 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.29 + 100.64.69.29 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.33.167 + 100.64.33.167 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.21.121 + 100.64.21.121 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.30 + 100.64.69.30 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.31 + 100.64.69.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.32 + 100.64.69.32 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.33 + 100.64.69.33 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.29.177 + 100.64.29.177 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6059e20-6093-11ee-a31b-270f2d0ccd3d + + + diff --git a/graph/incidents_graphml/c/c6063a60-6093-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/c/c6063a60-6093-11ee-a31b-270f2d0ccd3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d47d817774b6605b67e4ab6aa10a84d59847248a --- /dev/null +++ b/graph/incidents_graphml/c/c6063a60-6093-11ee-a31b-270f2d0ccd3d.graphml @@ -0,0 +1,637 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.34 + 100.64.69.34 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.81015625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.35 + 100.64.69.35 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + HOST + 100.64.15.132 + 100.64.15.132 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.12.61 + 100.64.12.61 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.36 + 100.64.69.36 + ["Exploiting Host","Exploiting Target"] + 0.81015625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.40.143 + 100.64.40.143 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.18.249 + 100.64.18.249 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.30.126 + 100.64.30.126 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.30.36 + 100.64.30.36 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.37 + 100.64.69.37 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.22.167 + 100.64.22.167 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.11.119 + 100.64.11.119 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189829 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + c6063a60-6093-11ee-a31b-270f2d0ccd3d + + + diff --git a/graph/incidents_graphml/c/c60c22e0-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c60c22e0-1228-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e48d7d15b1bb61f3a9ca99e6a605899896a51c1d --- /dev/null +++ b/graph/incidents_graphml/c/c60c22e0-1228-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,791 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.1 + 100.64.74.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.221 + 100.64.74.221 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.156 + 100.64.72.156 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.29.5 + 100.64.29.5 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.159 + HOST-14709 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.240 + 100.64.71.240 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.149 + 100.64.71.149 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.18.1 + 100.64.18.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.82 + 100.64.73.82 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.33.70 + 100.64.33.70 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.99 + 100.64.11.99 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","Meraki"] + + + HOST + 100.64.44.155 + 100.64.44.155 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.31.2 + 100.64.31.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.37.38 + 100.64.37.38 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.35.196 + 100.64.35.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.250 + 100.64.73.250 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.6.187 + USER-0015-1421.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.200 + 100.64.73.200 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.72 + 100.64.74.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.225 + 100.64.80.225 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.177 + 100.64.75.177 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687567682 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c60c22e0-1228-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/c/c60c2a10-df14-11ee-9778-4184b1db151c.graphml b/graph/incidents_graphml/c/c60c2a10-df14-11ee-9778-4184b1db151c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dfbc2e2330012df6157d13777b62ff19c3452da7 --- /dev/null +++ b/graph/incidents_graphml/c/c60c2a10-df14-11ee-9778-4184b1db151c.graphml @@ -0,0 +1,99 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.29 + 100.64.10.29 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.30 + 100.64.10.30 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710099081 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c60c2a10-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099081 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c60c2a10-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099081 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c60c2a10-df14-11ee-9778-4184b1db151c + + + diff --git a/graph/incidents_graphml/c/c60f3130-fbb9-11ee-947f-6184d270644d.graphml b/graph/incidents_graphml/c/c60f3130-fbb9-11ee-947f-6184d270644d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c5a7ed6a7c8b41062efecaad5747619bc167ca5 --- /dev/null +++ b/graph/incidents_graphml/c/c60f3130-fbb9-11ee-947f-6184d270644d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.12 + 100.64.65.12 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713248580 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c60f3130-fbb9-11ee-947f-6184d270644d + + + diff --git a/graph/incidents_graphml/c/c618d040-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/c/c618d040-d30b-11ee-ab07-630a66777c1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e48ef7338615f744e5a08e34a7fc6db9e990009 --- /dev/null +++ b/graph/incidents_graphml/c/c618d040-d30b-11ee-ab07-630a66777c1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.180 + 100.64.38.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708775801 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c618d040-d30b-11ee-ab07-630a66777c1a + + + diff --git a/graph/incidents_graphml/c/c619f970-0858-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/c/c619f970-0858-11ef-81c9-bbab78bb4e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe86476283e2438fee71cea01613c4dc29bbdff2 --- /dev/null +++ b/graph/incidents_graphml/c/c619f970-0858-11ef-81c9-bbab78bb4e36.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.186.190 + 172.31.186.190 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.97.183 + 100.64.97.183 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714636284 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c619f970-0858-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636284 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c619f970-0858-11ef-81c9-bbab78bb4e36 + + + diff --git a/graph/incidents_graphml/c/c61b3e10-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c61b3e10-1228-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b184444255899b80c8f4afa3a684dd94ed2d7ce7 --- /dev/null +++ b/graph/incidents_graphml/c/c61b3e10-1228-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.226 + 100.64.80.226 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687567682 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c61b3e10-1228-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/c/c62c3130-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/c/c62c3130-d30b-11ee-ab07-630a66777c1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2686cc067e275622fc41a3c9312c97062c2effc5 --- /dev/null +++ b/graph/incidents_graphml/c/c62c3130-d30b-11ee-ab07-630a66777c1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.180 + 100.64.38.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708775801 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c62c3130-d30b-11ee-ab07-630a66777c1a + + + diff --git a/graph/incidents_graphml/c/c62d7760-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c62d7760-6386-11ee-9eed-775092596c34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dfd6c526023fd23fab26ba827758bed5397c9408 --- /dev/null +++ b/graph/incidents_graphml/c/c62d7760-6386-11ee-9eed-775092596c34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.161 + 100.64.9.161 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696514099 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c62d7760-6386-11ee-9eed-775092596c34 + + + diff --git a/graph/incidents_graphml/c/c62fd1c0-0ad1-11ef-8694-dbcc61061be0.graphml b/graph/incidents_graphml/c/c62fd1c0-0ad1-11ef-8694-dbcc61061be0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c3b9e9292723a9f19db2f2dabcd95382d7c30199 --- /dev/null +++ b/graph/incidents_graphml/c/c62fd1c0-0ad1-11ef-8694-dbcc61061be0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.140 + 100.64.15.140 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714908156 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c62fd1c0-0ad1-11ef-8694-dbcc61061be0 + + + diff --git a/graph/incidents_graphml/c/c632b480-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/c/c632b480-210c-11ee-ab17-9db2be59825a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c25e442f22f086b0e65b8f354fb118ad753dba6 --- /dev/null +++ b/graph/incidents_graphml/c/c632b480-210c-11ee-ab17-9db2be59825a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.83 + USER-0015-1218.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689204924 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c632b480-210c-11ee-ab17-9db2be59825a + + + diff --git a/graph/incidents_graphml/c/c6382d90-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c6382d90-7902-11ee-aeda-45f788b28e25.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2d7df389b7160864cd0ba6288e34ed597f9f94d --- /dev/null +++ b/graph/incidents_graphml/c/c6382d90-7902-11ee-aeda-45f788b28e25.graphml @@ -0,0 +1,151 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.172 + 100.64.24.172 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698876331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6382d90-7902-11ee-aeda-45f788b28e25 + + + INCIDENT_LINK + 1698876331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6382d90-7902-11ee-aeda-45f788b28e25 + + + INCIDENT_LINK + 1698876331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6382d90-7902-11ee-aeda-45f788b28e25 + + + INCIDENT_LINK + 1698876331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6382d90-7902-11ee-aeda-45f788b28e25 + + + INCIDENT_LINK + 1698876331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c6382d90-7902-11ee-aeda-45f788b28e25 + + + diff --git a/graph/incidents_graphml/c/c63c8a60-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/c63c8a60-ee30-11ec-9c18-c95a461c6308.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55dbc49ac6510871bb861516dbca3c6c76437114 --- /dev/null +++ b/graph/incidents_graphml/c/c63c8a60-ee30-11ec-9c18-c95a461c6308.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.86 + 100.64.76.86 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.114 + 100.64.74.114 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655465379 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c63c8a60-ee30-11ec-9c18-c95a461c6308 + + + INCIDENT_LINK + 1655465379 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c63c8a60-ee30-11ec-9c18-c95a461c6308 + + + diff --git a/graph/incidents_graphml/c/c6408a30-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c6408a30-6386-11ee-9eed-775092596c34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbfa969b7ff7489569c656f3b556c97ec7bbef3b --- /dev/null +++ b/graph/incidents_graphml/c/c6408a30-6386-11ee-9eed-775092596c34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.161 + 100.64.9.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696514099 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6408a30-6386-11ee-9eed-775092596c34 + + + diff --git a/graph/incidents_graphml/c/c6418500-0ad1-11ef-8694-dbcc61061be0.graphml b/graph/incidents_graphml/c/c6418500-0ad1-11ef-8694-dbcc61061be0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa160afc45b5e4115e5a4e40306278f79d46b216 --- /dev/null +++ b/graph/incidents_graphml/c/c6418500-0ad1-11ef-8694-dbcc61061be0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.140 + 100.64.15.140 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714908156 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6418500-0ad1-11ef-8694-dbcc61061be0 + + + diff --git a/graph/incidents_graphml/c/c647bdf0-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c647bdf0-7902-11ee-aeda-45f788b28e25.graphml new file mode 100644 index 0000000000000000000000000000000000000000..760e61fce4c42e143603700dd6df2f09ef41a32b --- /dev/null +++ b/graph/incidents_graphml/c/c647bdf0-7902-11ee-aeda-45f788b28e25.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.172 + 100.64.24.172 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698876331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c647bdf0-7902-11ee-aeda-45f788b28e25 + + + diff --git a/graph/incidents_graphml/c/c64b8390-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c64b8390-73d5-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9f266692c1ed9badaa455f4282b1525bd1cb3b6 --- /dev/null +++ b/graph/incidents_graphml/c/c64b8390-73d5-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.18 + 100.64.67.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698307248 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c64b8390-73d5-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/c/c64c4a00-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c64c4a00-6386-11ee-9eed-775092596c34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48c90f4422eefa209ef4824983109b028f3a88ba --- /dev/null +++ b/graph/incidents_graphml/c/c64c4a00-6386-11ee-9eed-775092596c34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.230 + 100.64.51.230 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696514099 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c64c4a00-6386-11ee-9eed-775092596c34 + + + diff --git a/graph/incidents_graphml/c/c64f40a0-0ad1-11ef-8694-dbcc61061be0.graphml b/graph/incidents_graphml/c/c64f40a0-0ad1-11ef-8694-dbcc61061be0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..47ae63d477f2fa800b5c3e049e13414033302c7c --- /dev/null +++ b/graph/incidents_graphml/c/c64f40a0-0ad1-11ef-8694-dbcc61061be0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.21 + 100.64.3.21 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714908156 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c64f40a0-0ad1-11ef-8694-dbcc61061be0 + + + diff --git a/graph/incidents_graphml/c/c655f3f0-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/c/c655f3f0-210c-11ee-ab17-9db2be59825a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94245cc4491895300aeb208c81efcbef74486596 --- /dev/null +++ b/graph/incidents_graphml/c/c655f3f0-210c-11ee-ab17-9db2be59825a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.83 + USER-0015-1218.example.internal + ["Exploiting Target","Exploiting Host"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689204924 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c655f3f0-210c-11ee-ab17-9db2be59825a + + + diff --git a/graph/incidents_graphml/c/c6570030-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c6570030-7902-11ee-aeda-45f788b28e25.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b4521df71abc5e7afcb0f01dac72f7b9dcacfca --- /dev/null +++ b/graph/incidents_graphml/c/c6570030-7902-11ee-aeda-45f788b28e25.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.174 + 100.64.24.174 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698876332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c6570030-7902-11ee-aeda-45f788b28e25 + + + diff --git a/graph/incidents_graphml/c/c65dfa20-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c65dfa20-73d5-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d29e7969ae1937e2f6a8f016fde3e4ad05dc1ae --- /dev/null +++ b/graph/incidents_graphml/c/c65dfa20-73d5-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.18 + 100.64.67.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698307248 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c65dfa20-73d5-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/c/c6655810-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c6655810-7902-11ee-aeda-45f788b28e25.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09c759aa7790a78548e0b63a34e89eca31f94532 --- /dev/null +++ b/graph/incidents_graphml/c/c6655810-7902-11ee-aeda-45f788b28e25.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.174 + 100.64.24.174 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698876332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c6655810-7902-11ee-aeda-45f788b28e25 + + + diff --git a/graph/incidents_graphml/c/c66d0060-93b5-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/c/c66d0060-93b5-11ee-ad07-e3190f846a2a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52c6c09b0b05a5d33e204799fe5adbea9e4ce661 --- /dev/null +++ b/graph/incidents_graphml/c/c66d0060-93b5-11ee-ad07-e3190f846a2a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.77 + 100.64.69.77 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1701811942 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c66d0060-93b5-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701811942 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c66d0060-93b5-11ee-ad07-e3190f846a2a + + + diff --git a/graph/incidents_graphml/c/c6727770-1007-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/c/c6727770-1007-11ee-af9c-772eadfde881.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c75fde0590bfe8bcc09a0c054f042860513773e --- /dev/null +++ b/graph/incidents_graphml/c/c6727770-1007-11ee-af9c-772eadfde881.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.88 + USER-0015-1473.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687333607 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6727770-1007-11ee-af9c-772eadfde881 + + + diff --git a/graph/incidents_graphml/c/c673fe10-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c673fe10-7902-11ee-aeda-45f788b28e25.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1676da557587e591dcddbbe12490fc631da8b39 --- /dev/null +++ b/graph/incidents_graphml/c/c673fe10-7902-11ee-aeda-45f788b28e25.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.174 + 100.64.13.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698876332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c673fe10-7902-11ee-aeda-45f788b28e25 + + + diff --git a/graph/incidents_graphml/c/c6798180-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/c/c6798180-210c-11ee-ab17-9db2be59825a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..358980b4aa0a7145a104426b6606c157884fd748 --- /dev/null +++ b/graph/incidents_graphml/c/c6798180-210c-11ee-ab17-9db2be59825a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.62 + 100.64.22.62 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689204925 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + c6798180-210c-11ee-ab17-9db2be59825a + + + diff --git a/graph/incidents_graphml/c/c67cb170-2d7c-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/c/c67cb170-2d7c-11ef-88d9-1fb9581a602f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5fbc7256af628b00631b9bdb9086a29464690f6 --- /dev/null +++ b/graph/incidents_graphml/c/c67cb170-2d7c-11ef-88d9-1fb9581a602f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.248.123 + USER-0015-2106.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.93.205 + 100.64.93.205 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718719940 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c67cb170-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719940 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c67cb170-2d7c-11ef-88d9-1fb9581a602f + + + diff --git a/graph/incidents_graphml/c/c680c970-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c680c970-ab01-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72d775e96e8c8d1f654f325d5a341d78db1057c3 --- /dev/null +++ b/graph/incidents_graphml/c/c680c970-ab01-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.138 + 100.64.26.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1704373460 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c680c970-ab01-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/c/c6839060-10b5-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/c/c6839060-10b5-11ee-aed8-b565505929b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8aa42c07e8d363c37981bba3889b9dcca5bd89ee --- /dev/null +++ b/graph/incidents_graphml/c/c6839060-10b5-11ee-aed8-b565505929b5.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.159 + 100.64.9.159 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.60 + 100.64.68.60 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1687408340 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6839060-10b5-11ee-aed8-b565505929b5 + + + INCIDENT_LINK + 1687408340 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6839060-10b5-11ee-aed8-b565505929b5 + + + INCIDENT_LINK + 1687408340 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6839060-10b5-11ee-aed8-b565505929b5 + + + INCIDENT_LINK + 1687408340 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c6839060-10b5-11ee-aed8-b565505929b5 + + + diff --git a/graph/incidents_graphml/c/c68aba60-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c68aba60-7902-11ee-aeda-45f788b28e25.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a3f3d46be5718931e1da19c81090cdbe0b93f42 --- /dev/null +++ b/graph/incidents_graphml/c/c68aba60-7902-11ee-aeda-45f788b28e25.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.174 + 100.64.13.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698876332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + c68aba60-7902-11ee-aeda-45f788b28e25 + + + diff --git a/graph/incidents_graphml/c/c68f5610-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/c68f5610-8c0d-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7142e464f997fcf720adb20eb5bec90956315a4a --- /dev/null +++ b/graph/incidents_graphml/c/c68f5610-8c0d-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.190 + 100.64.16.190 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700970129 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + c68f5610-8c0d-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/c/c695b100-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c695b100-ab01-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af9e1236d91bbcc9bc113e648be1cd15bce47851 --- /dev/null +++ b/graph/incidents_graphml/c/c695b100-ab01-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.26.138 + 100.64.26.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704373461 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c695b100-ab01-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/c/c69cbbc0-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c69cbbc0-7902-11ee-aeda-45f788b28e25.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cad0123797abe5c30d7d71eacd813496bd9c592 --- /dev/null +++ b/graph/incidents_graphml/c/c69cbbc0-7902-11ee-aeda-45f788b28e25.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.174 + 100.64.13.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698876332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + c69cbbc0-7902-11ee-aeda-45f788b28e25 + + +