diff --git a/graph/incidents_graphml/b/bdab66a0-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/bdab66a0-3d0d-11ee-ba1f-812391e2855d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86f12fd17cdb4647ae081756bec846b192f1b2dc
--- /dev/null
+++ b/graph/incidents_graphml/b/bdab66a0-3d0d-11ee-ba1f-812391e2855d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.30
+ 100.64.66.30
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283972
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bdab66a0-3d0d-11ee-ba1f-812391e2855d
+
+
+
diff --git a/graph/incidents_graphml/b/bdb21760-311a-11ee-87a2-613e036775fd.graphml b/graph/incidents_graphml/b/bdb21760-311a-11ee-87a2-613e036775fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa01bfcfe541ee0288f1fe7168e85e1505c77af8
--- /dev/null
+++ b/graph/incidents_graphml/b/bdb21760-311a-11ee-87a2-613e036775fd.graphml
@@ -0,0 +1,387 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.64
+ 100.64.58.64
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.65
+ 100.64.58.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.66
+ 100.64.58.66
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.67
+ 100.64.58.67
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.68
+ USER-0015-1427.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.69
+ 100.64.58.69
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.70
+ 100.64.58.70
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.207
+ 100.64.11.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.71
+ 100.64.58.71
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970141
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb21760-311a-11ee-87a2-613e036775fd
+
+
+
diff --git a/graph/incidents_graphml/b/bdb25870-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/b/bdb25870-5bee-11ee-82a0-9da780b0dcc4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38ea214267f2e769ea577de5e0dc60ee4d0b62ec
--- /dev/null
+++ b/graph/incidents_graphml/b/bdb25870-5bee-11ee-82a0-9da780b0dcc4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.202
+ 100.64.12.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695679143
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bdb25870-5bee-11ee-82a0-9da780b0dcc4
+
+
+
diff --git a/graph/incidents_graphml/b/bdb2b730-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/bdb2b730-6c00-11ee-9973-9b86183b2cfc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..faf0a885993ae6e3b400ef28322d66f0933d2417
--- /dev/null
+++ b/graph/incidents_graphml/b/bdb2b730-6c00-11ee-9973-9b86183b2cfc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.90.14
+ 100.64.90.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697446093
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bdb2b730-6c00-11ee-9973-9b86183b2cfc
+
+
+
diff --git a/graph/incidents_graphml/b/bdb6d7c0-131d-11ee-8854-7b8acd154f2f.graphml b/graph/incidents_graphml/b/bdb6d7c0-131d-11ee-8854-7b8acd154f2f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfd2c0f9ff46833c8dc29bbc59e23b2f8ecb4ff5
--- /dev/null
+++ b/graph/incidents_graphml/b/bdb6d7c0-131d-11ee-8854-7b8acd154f2f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.34
+ 100.64.53.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687672895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bdb6d7c0-131d-11ee-8854-7b8acd154f2f
+
+
+
diff --git a/graph/incidents_graphml/b/bdb75c00-a166-11ed-863f-a161c6cf34a1.graphml b/graph/incidents_graphml/b/bdb75c00-a166-11ed-863f-a161c6cf34a1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8686831c86e8d3431fb0bda1133d8b01af2dda92
--- /dev/null
+++ b/graph/incidents_graphml/b/bdb75c00-a166-11ed-863f-a161c6cf34a1.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.107.156
+ 192.168.107.156
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.211
+ 100.64.86.211
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 192.168.17.89
+ 192.168.17.89
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675169816
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb75c00-a166-11ed-863f-a161c6cf34a1
+
+
+ INCIDENT_LINK
+ 1675169816
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb75c00-a166-11ed-863f-a161c6cf34a1
+
+
+ INCIDENT_LINK
+ 1675169816
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb75c00-a166-11ed-863f-a161c6cf34a1
+
+
+ INCIDENT_LINK
+ 1675169816
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdb75c00-a166-11ed-863f-a161c6cf34a1
+
+
+
diff --git a/graph/incidents_graphml/b/bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f.graphml b/graph/incidents_graphml/b/bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..efa61b7dbffad2fd841ec0458353d0526f573628
--- /dev/null
+++ b/graph/incidents_graphml/b/bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f.graphml
@@ -0,0 +1,825 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.86
+ 100.64.52.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.87
+ 100.64.52.87
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.88
+ 100.64.52.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.219
+ 100.64.13.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.89
+ 100.64.52.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.90
+ 100.64.52.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.91
+ 100.64.52.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.92
+ 100.64.52.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.74
+ 100.64.24.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.239
+ 100.64.37.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.93
+ USER-0015-1396.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.63
+ 100.64.23.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.170
+ 100.64.51.170
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.94
+ 100.64.52.94
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.14
+ 100.64.22.14
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ HOST-2906
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdb93a60-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+
diff --git a/graph/incidents_graphml/b/bdbd55c0-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/bdbd55c0-2d5b-11ee-9400-61c78ce5335d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5a6101052544b9c5739720693eeefe0fa4b1ae1
--- /dev/null
+++ b/graph/incidents_graphml/b/bdbd55c0-2d5b-11ee-9400-61c78ce5335d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.51
+ USER-0015-1418.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690558254
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdbd55c0-2d5b-11ee-9400-61c78ce5335d
+
+
+
diff --git a/graph/incidents_graphml/b/bdbdb370-ba66-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/b/bdbdb370-ba66-11ed-ace2-c7d81fb15087.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d53c327d60c2b35791e0bb3289e693e5d6f5bba
--- /dev/null
+++ b/graph/incidents_graphml/b/bdbdb370-ba66-11ed-ace2-c7d81fb15087.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.230
+ 100.64.75.230
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.200
+ 100.64.72.200
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677918595
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdbdb370-ba66-11ed-ace2-c7d81fb15087
+
+
+
diff --git a/graph/incidents_graphml/b/bdc10f10-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/bdc10f10-6c00-11ee-9973-9b86183b2cfc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03ed750e693dd4db91f7324d28d52c2542ab128e
--- /dev/null
+++ b/graph/incidents_graphml/b/bdc10f10-6c00-11ee-9973-9b86183b2cfc.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.130
+ 100.64.57.130
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1697446093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdc10f10-6c00-11ee-9973-9b86183b2cfc
+
+
+ INCIDENT_LINK
+ 1697446093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdc10f10-6c00-11ee-9973-9b86183b2cfc
+
+
+ INCIDENT_LINK
+ 1697446093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdc10f10-6c00-11ee-9973-9b86183b2cfc
+
+
+
diff --git a/graph/incidents_graphml/b/bdc19ab0-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/b/bdc19ab0-5bee-11ee-82a0-9da780b0dcc4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90914ed7e6aa986a8055def6ca6ce0d2cf684574
--- /dev/null
+++ b/graph/incidents_graphml/b/bdc19ab0-5bee-11ee-82a0-9da780b0dcc4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.202
+ 100.64.12.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695679143
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bdc19ab0-5bee-11ee-82a0-9da780b0dcc4
+
+
+
diff --git a/graph/incidents_graphml/b/bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fec7c1d11e287afed8b2bf427fb04acf4145adb
--- /dev/null
+++ b/graph/incidents_graphml/b/bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.53
+ 100.64.33.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951583
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bdc30a40-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/b/bdccd150-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/bdccd150-3d0d-11ee-ba1f-812391e2855d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8f67e427f9e9b438c5408d0448bf0c6c0b62d98
--- /dev/null
+++ b/graph/incidents_graphml/b/bdccd150-3d0d-11ee-ba1f-812391e2855d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.32
+ 100.64.66.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283972
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdccd150-3d0d-11ee-ba1f-812391e2855d
+
+
+
diff --git a/graph/incidents_graphml/b/bdd07860-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/bdd07860-6c00-11ee-9973-9b86183b2cfc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44cfb877a75ee59adf4dfac0785515e2df26f98a
--- /dev/null
+++ b/graph/incidents_graphml/b/bdd07860-6c00-11ee-9973-9b86183b2cfc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.57.130
+ 100.64.57.130
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697446093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bdd07860-6c00-11ee-9973-9b86183b2cfc
+
+
+
diff --git a/graph/incidents_graphml/b/bdea14f0-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/b/bdea14f0-41fd-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc0c1315c58c75adfde27c52a8719e7be440c9c4
--- /dev/null
+++ b/graph/incidents_graphml/b/bdea14f0-41fd-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.133
+ 100.64.66.133
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692826856
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdea14f0-41fd-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/b/bdeefa80-00b9-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/b/bdeefa80-00b9-11ef-8b56-b9c5ad676a8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e682d3875265dba0458be0b87d46e60474fdc88
--- /dev/null
+++ b/graph/incidents_graphml/b/bdeefa80-00b9-11ef-8b56-b9c5ad676a8a.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.168
+ 100.64.70.168
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]
+
+
+ HOST
+ 100.64.70.93
+ 100.64.70.93
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.169
+ USER-0015-1596.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713798322
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdeefa80-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798322
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdeefa80-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798322
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdeefa80-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798322
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdeefa80-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798322
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdeefa80-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798322
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdeefa80-00b9-11ef-8b56-b9c5ad676a8a
+
+
+
diff --git a/graph/incidents_graphml/b/bdf6e800-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/b/bdf6e800-f613-11ed-a3d6-ad85d59eee66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4dcc9dd06665f7d709d1601da44fd8dfd07e937c
--- /dev/null
+++ b/graph/incidents_graphml/b/bdf6e800-f613-11ed-a3d6-ad85d59eee66.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.65
+ 100.64.48.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.119
+ 100.64.71.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.4.2
+ 100.64.4.2
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1684480017
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdf6e800-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480017
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdf6e800-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480017
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdf6e800-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480017
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bdf6e800-f613-11ed-a3d6-ad85d59eee66
+
+
+
diff --git a/graph/incidents_graphml/b/bdf9cc60-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/b/bdf9cc60-41fd-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5267a90449e8792f10b01ed8e4e0e61b62830b40
--- /dev/null
+++ b/graph/incidents_graphml/b/bdf9cc60-41fd-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.133
+ 100.64.66.133
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692826856
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bdf9cc60-41fd-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/b/bdf9cc70-a070-11ee-8eba-81c30328b488.graphml b/graph/incidents_graphml/b/bdf9cc70-a070-11ee-8eba-81c30328b488.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85a1090e267faa74ae86196c576d64c8b11cd216
--- /dev/null
+++ b/graph/incidents_graphml/b/bdf9cc70-a070-11ee-8eba-81c30328b488.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.157
+ 100.64.53.157
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703211657
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdf9cc70-a070-11ee-8eba-81c30328b488
+
+
+
diff --git a/graph/incidents_graphml/b/bdfa2e80-6cba-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/b/bdfa2e80-6cba-11ed-88c8-935f200141c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0754f31b0171dedf4705e1ce0a5df2454afd2ca3
--- /dev/null
+++ b/graph/incidents_graphml/b/bdfa2e80-6cba-11ed-88c8-935f200141c8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.87
+ 100.64.72.87
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.49
+ 100.64.1.49
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1669378482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdfa2e80-6cba-11ed-88c8-935f200141c8
+
+
+ INCIDENT_LINK
+ 1669378482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bdfa2e80-6cba-11ed-88c8-935f200141c8
+
+
+
diff --git a/graph/incidents_graphml/b/bdfa37b0-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/bdfa37b0-2d5b-11ee-9400-61c78ce5335d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19f61f31279a5fe223f3b0cb2bba21b28fdeaa55
--- /dev/null
+++ b/graph/incidents_graphml/b/bdfa37b0-2d5b-11ee-9400-61c78ce5335d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.51
+ USER-0015-1418.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690558255
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bdfa37b0-2d5b-11ee-9400-61c78ce5335d
+
+
+
diff --git a/graph/incidents_graphml/b/be02f970-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be02f970-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64c6a2d5c537e6c08bc849b95f0364d6925ec151
--- /dev/null
+++ b/graph/incidents_graphml/b/be02f970-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.4
+ 100.64.29.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951583
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be02f970-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/b/be045ed0-3b73-11ef-b1e4-3da31b742190.graphml b/graph/incidents_graphml/b/be045ed0-3b73-11ef-b1e4-3da31b742190.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6e6ca83aeb8ab0621d5bf1f820a2776898ffbe3
--- /dev/null
+++ b/graph/incidents_graphml/b/be045ed0-3b73-11ef-b1e4-3da31b742190.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.239
+ 100.64.21.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.30
+ 100.64.46.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.31
+ 100.64.46.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.230
+ 100.64.20.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.255
+ 100.64.23.255
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.32
+ 100.64.46.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+ INCIDENT_LINK
+ 1720255376
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be045ed0-3b73-11ef-b1e4-3da31b742190
+
+
+
diff --git a/graph/incidents_graphml/b/be074240-3d0d-11ee-ba1f-812391e2855d.graphml b/graph/incidents_graphml/b/be074240-3d0d-11ee-ba1f-812391e2855d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5a737c9c0184e247c09d588def0c8cdd1f80f26
--- /dev/null
+++ b/graph/incidents_graphml/b/be074240-3d0d-11ee-ba1f-812391e2855d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.32
+ 100.64.66.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283973
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be074240-3d0d-11ee-ba1f-812391e2855d
+
+
+
diff --git a/graph/incidents_graphml/b/be083320-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/b/be083320-f9fb-11ee-a91e-b385ff48b568.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b24d2f580c54b930478f4d220f959ba5c65746b
--- /dev/null
+++ b/graph/incidents_graphml/b/be083320-f9fb-11ee-a91e-b385ff48b568.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.126
+ 100.64.9.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1713057011
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be083320-f9fb-11ee-a91e-b385ff48b568
+
+
+
diff --git a/graph/incidents_graphml/b/be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..923c2cd0ba02710746a8ecdfcf57e7953fb16d6e
--- /dev/null
+++ b/graph/incidents_graphml/b/be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.4
+ 100.64.29.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951584
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be0fcab0-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/b/be10b0b0-4a09-11ee-8bf8-c1f4992fd587.graphml b/graph/incidents_graphml/b/be10b0b0-4a09-11ee-8bf8-c1f4992fd587.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..678449087e978f9e3807c0fb382c71aa11500c70
--- /dev/null
+++ b/graph/incidents_graphml/b/be10b0b0-4a09-11ee-8bf8-c1f4992fd587.graphml
@@ -0,0 +1,359 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.67
+ 100.64.33.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.189
+ 100.64.17.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.68
+ 100.64.33.68
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.190
+ 100.64.32.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.69
+ 100.64.33.69
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.70
+ 100.64.33.70
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.71
+ HOST-6312
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.72
+ 100.64.33.72
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.176
+ 100.64.17.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+ INCIDENT_LINK
+ 1693711619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be10b0b0-4a09-11ee-8bf8-c1f4992fd587
+
+
+
diff --git a/graph/incidents_graphml/b/be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8724ca0a5713ddcbddd5dfbdf8946c4768f71134
--- /dev/null
+++ b/graph/incidents_graphml/b/be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.46
+ 100.64.10.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951584
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be1dfb80-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/b/be226350-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/be226350-3e29-11ee-b681-89e3497f1d7e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6208fd7e3f723f0bed1047f274ce7cd4e05c677
--- /dev/null
+++ b/graph/incidents_graphml/b/be226350-3e29-11ee-b681-89e3497f1d7e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692405950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be226350-3e29-11ee-b681-89e3497f1d7e
+
+
+
diff --git a/graph/incidents_graphml/b/be256290-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/b/be256290-1c3c-11ed-9dc4-eb234c0496d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3f3dd57f6f30cbe1968358b576209d91a16608b
--- /dev/null
+++ b/graph/incidents_graphml/b/be256290-1c3c-11ed-9dc4-eb234c0496d2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.37
+ 100.64.78.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660528273
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be256290-1c3c-11ed-9dc4-eb234c0496d2
+
+
+ INCIDENT_LINK
+ 1660528273
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be256290-1c3c-11ed-9dc4-eb234c0496d2
+
+
+
diff --git a/graph/incidents_graphml/b/be289e00-cf6a-11ee-91bc-e1cf8103bf6f.graphml b/graph/incidents_graphml/b/be289e00-cf6a-11ee-91bc-e1cf8103bf6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f08fa353d4216a84ccea44b53b6b3a81d2e06483
--- /dev/null
+++ b/graph/incidents_graphml/b/be289e00-cf6a-11ee-91bc-e1cf8103bf6f.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.152
+ 100.64.19.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.104
+ 100.64.52.104
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.126
+ 100.64.2.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.29
+ 100.64.39.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.178
+ 100.64.26.178
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.254
+ 100.64.3.254
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.118
+ 100.64.16.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.188
+ 100.64.5.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.105
+ 100.64.52.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.252
+ 100.64.9.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.108
+ 100.64.8.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.120
+ 100.64.8.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.106
+ 100.64.52.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.22
+ 100.64.14.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.107
+ 100.64.52.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.34
+ 100.64.7.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.130
+ 100.64.18.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be289e00-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+
diff --git a/graph/incidents_graphml/b/be28cd70-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/b/be28cd70-f613-11ed-a3d6-ad85d59eee66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e95e2f128fa2c6ab53a09f98b114b974402238b
--- /dev/null
+++ b/graph/incidents_graphml/b/be28cd70-f613-11ed-a3d6-ad85d59eee66.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.69
+ 100.64.72.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.27.73
+ 100.64.27.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.3.153
+ 100.64.3.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684480017
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be28cd70-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480017
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be28cd70-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480017
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be28cd70-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480017
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be28cd70-f613-11ed-a3d6-ad85d59eee66
+
+
+
diff --git a/graph/incidents_graphml/b/be29bb50-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be29bb50-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aafc3e2d00e4bf685879e263d13c2016ee73f4e1
--- /dev/null
+++ b/graph/incidents_graphml/b/be29bb50-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.22
+ 100.64.59.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951584
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be29bb50-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/b/be2edc40-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/be2edc40-2d5b-11ee-9400-61c78ce5335d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3bb355a55ca58f89d49d7a1a0cd224cc4d216c5
--- /dev/null
+++ b/graph/incidents_graphml/b/be2edc40-2d5b-11ee-9400-61c78ce5335d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.122
+ 100.64.43.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690558255
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ be2edc40-2d5b-11ee-9400-61c78ce5335d
+
+
+
diff --git a/graph/incidents_graphml/b/be33c870-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/be33c870-3e29-11ee-b681-89e3497f1d7e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29c9316600d9a3f3921bc32d3369c019890b11f7
--- /dev/null
+++ b/graph/incidents_graphml/b/be33c870-3e29-11ee-b681-89e3497f1d7e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692405950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ be33c870-3e29-11ee-b681-89e3497f1d7e
+
+
+
diff --git a/graph/incidents_graphml/b/be35f050-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be35f050-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1212ac8bebefba199b695a65ad0e5505e405650
--- /dev/null
+++ b/graph/incidents_graphml/b/be35f050-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.22
+ 100.64.59.22
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951584
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be35f050-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/b/be3a7230-a060-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/b/be3a7230-a060-11ee-9181-41cbe26a7b16.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78eee952cef779af4149e5c73a70643a2f646272
--- /dev/null
+++ b/graph/incidents_graphml/b/be3a7230-a060-11ee-9181-41cbe26a7b16.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.41
+ 100.64.68.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1703204786
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be3a7230-a060-11ee-9181-41cbe26a7b16
+
+
+ INCIDENT_LINK
+ 1703204786
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be3a7230-a060-11ee-9181-41cbe26a7b16
+
+
+
diff --git a/graph/incidents_graphml/b/be3d1510-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/be3d1510-2f74-11ee-8001-3b5fed8c9dd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f61073cd62031723f5a1edf8ccbaf274b1c1e99
--- /dev/null
+++ b/graph/incidents_graphml/b/be3d1510-2f74-11ee-8001-3b5fed8c9dd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.188
+ 100.64.57.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690788895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be3d1510-2f74-11ee-8001-3b5fed8c9dd3
+
+
+
diff --git a/graph/incidents_graphml/b/be3e4440-117d-11ee-b107-2764325d5a51.graphml b/graph/incidents_graphml/b/be3e4440-117d-11ee-b107-2764325d5a51.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..daa88c989ea5e2b89de83ee88c6afe1d72e5705f
--- /dev/null
+++ b/graph/incidents_graphml/b/be3e4440-117d-11ee-b107-2764325d5a51.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.154
+ 100.64.60.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687494225
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be3e4440-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494225
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be3e4440-117d-11ee-b107-2764325d5a51
+
+
+
diff --git a/graph/incidents_graphml/b/be43c370-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/be43c370-edf0-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59cd4b591ef25cd5316365a4d2f3628a39bc21d6
--- /dev/null
+++ b/graph/incidents_graphml/b/be43c370-edf0-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.157
+ 100.64.45.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711732873
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be43c370-edf0-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/b/be4906a0-ffe3-11ee-b8be-512e5047d566.graphml b/graph/incidents_graphml/b/be4906a0-ffe3-11ee-b8be-512e5047d566.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12bec8daa32351740df1bf05d5ed6b2db7081f0c
--- /dev/null
+++ b/graph/incidents_graphml/b/be4906a0-ffe3-11ee-b8be-512e5047d566.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.175
+ 100.64.33.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713706411
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be4906a0-ffe3-11ee-b8be-512e5047d566
+
+
+
diff --git a/graph/incidents_graphml/b/be4d2280-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/be4d2280-ebef-11ec-9679-75d3d6184114.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3a3ce5941f6f16d9dffe74b00df9e10b5553c25
--- /dev/null
+++ b/graph/incidents_graphml/b/be4d2280-ebef-11ec-9679-75d3d6184114.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.80
+ 100.64.71.80
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.116
+ USER-0015-1741.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655217546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be4d2280-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be4d2280-ebef-11ec-9679-75d3d6184114
+
+
+
diff --git a/graph/incidents_graphml/b/be583f00-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/b/be583f00-0d16-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c4f9823f77dc8b703699aa5d93cb0ad7a32a361
--- /dev/null
+++ b/graph/incidents_graphml/b/be583f00-0d16-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,135 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.65
+ 100.64.21.65
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.42
+ 100.64.72.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.39
+ 100.64.73.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.250
+ 100.64.70.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687010183
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be583f00-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010183
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be583f00-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010183
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be583f00-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010183
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be583f00-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010183
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be583f00-0d16-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/b/be5a98c0-f6a1-11ee-8b23-bde5dce38992.graphml b/graph/incidents_graphml/b/be5a98c0-f6a1-11ee-8b23-bde5dce38992.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e167b9691814bd49161a00a616fd2d753fa28e06
--- /dev/null
+++ b/graph/incidents_graphml/b/be5a98c0-f6a1-11ee-8b23-bde5dce38992.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.18
+ 100.64.22.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712688503
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be5a98c0-f6a1-11ee-8b23-bde5dce38992
+
+
+
diff --git a/graph/incidents_graphml/b/be5f2330-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be5f2330-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11285f4c6f879630f4423fc8cbfefd9e065a9da0
--- /dev/null
+++ b/graph/incidents_graphml/b/be5f2330-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.24
+ 100.64.59.24
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951584
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be5f2330-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/b/be62e490-2d5b-11ee-9400-61c78ce5335d.graphml b/graph/incidents_graphml/b/be62e490-2d5b-11ee-9400-61c78ce5335d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bfaeba35c35c53f70bd2a0aeb20891a296e6f694
--- /dev/null
+++ b/graph/incidents_graphml/b/be62e490-2d5b-11ee-9400-61c78ce5335d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.251
+ 100.64.18.251
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690558255
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be62e490-2d5b-11ee-9400-61c78ce5335d
+
+
+
diff --git a/graph/incidents_graphml/b/be662630-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/b/be662630-21fe-11ef-a065-0d11f2930c39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d2fd17e669680edf56e7b66eff6287ca3d78516
--- /dev/null
+++ b/graph/incidents_graphml/b/be662630-21fe-11ef-a065-0d11f2930c39.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.153
+ 100.64.32.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717456347
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be662630-21fe-11ef-a065-0d11f2930c39
+
+
+
diff --git a/graph/incidents_graphml/b/be6b96c0-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/be6b96c0-edf0-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a192330ca34325c12a1dc72b2fab76b83e675c92
--- /dev/null
+++ b/graph/incidents_graphml/b/be6b96c0-edf0-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.159
+ 100.64.45.159
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711732873
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be6b96c0-edf0-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/b/be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/b/be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..117428479138fc728b7ddadaa8cd17b851f24119
--- /dev/null
+++ b/graph/incidents_graphml/b/be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.24
+ 100.64.59.24
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951584
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be6bcd60-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/b/be6e3f00-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/be6e3f00-6c00-11ee-9973-9b86183b2cfc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac573930e1f5fb1aed123fb70c0e52c8b73dfdf1
--- /dev/null
+++ b/graph/incidents_graphml/b/be6e3f00-6c00-11ee-9973-9b86183b2cfc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.157
+ USER-0015-2038.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1697446094
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be6e3f00-6c00-11ee-9973-9b86183b2cfc
+
+
+
diff --git a/graph/incidents_graphml/b/be71b9a0-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/be71b9a0-2f74-11ee-8001-3b5fed8c9dd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70d9de41f80fad35f871bc69f2c5aa8b7cf0d9ee
--- /dev/null
+++ b/graph/incidents_graphml/b/be71b9a0-2f74-11ee-8001-3b5fed8c9dd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.188
+ 100.64.57.188
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690788895
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be71b9a0-2f74-11ee-8001-3b5fed8c9dd3
+
+
+
diff --git a/graph/incidents_graphml/b/be748050-ba66-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/b/be748050-ba66-11ed-ace2-c7d81fb15087.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..527be0a510686440174d74269f79c834f8630282
--- /dev/null
+++ b/graph/incidents_graphml/b/be748050-ba66-11ed-ace2-c7d81fb15087.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.231
+ 100.64.75.231
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677918596
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be748050-ba66-11ed-ace2-c7d81fb15087
+
+
+
diff --git a/graph/incidents_graphml/b/be79d540-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/b/be79d540-21fe-11ef-a065-0d11f2930c39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6c44020feda27db64a05ffaf0a60411936340ab
--- /dev/null
+++ b/graph/incidents_graphml/b/be79d540-21fe-11ef-a065-0d11f2930c39.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.153
+ 100.64.32.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717456347
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be79d540-21fe-11ef-a065-0d11f2930c39
+
+
+
diff --git a/graph/incidents_graphml/b/be7b3710-ba66-11ed-ace2-c7d81fb15087.graphml b/graph/incidents_graphml/b/be7b3710-ba66-11ed-ace2-c7d81fb15087.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56aa6c82afb8d278f7fe1b3d3b5ecc6e5ac9a5b8
--- /dev/null
+++ b/graph/incidents_graphml/b/be7b3710-ba66-11ed-ace2-c7d81fb15087.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.231
+ 100.64.75.231
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1677918596
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be7b3710-ba66-11ed-ace2-c7d81fb15087
+
+
+
diff --git a/graph/incidents_graphml/b/be7d7110-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/be7d7110-edf0-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b22ae89b69f4211623d97a5e5ffb5278774aa806
--- /dev/null
+++ b/graph/incidents_graphml/b/be7d7110-edf0-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.159
+ 100.64.45.159
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711732873
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be7d7110-edf0-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/b/be7df670-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/b/be7df670-6c00-11ee-9973-9b86183b2cfc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5dd403908f721c145309deaf97e13da4d2293fb5
--- /dev/null
+++ b/graph/incidents_graphml/b/be7df670-6c00-11ee-9973-9b86183b2cfc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.45.157
+ USER-0015-2038.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697446094
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be7df670-6c00-11ee-9973-9b86183b2cfc
+
+
+
diff --git a/graph/incidents_graphml/b/be803ac0-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/be803ac0-3e29-11ee-b681-89e3497f1d7e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b49e0f7a2c7bb837b6976dcb0505aeb396dd053b
--- /dev/null
+++ b/graph/incidents_graphml/b/be803ac0-3e29-11ee-b681-89e3497f1d7e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.17
+ 100.64.11.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692405950
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ be803ac0-3e29-11ee-b681-89e3497f1d7e
+
+
+
diff --git a/graph/incidents_graphml/b/be89ae70-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/be89ae70-2f74-11ee-8001-3b5fed8c9dd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6027cc148544271e0758c2c2fcf2d55d59acc02f
--- /dev/null
+++ b/graph/incidents_graphml/b/be89ae70-2f74-11ee-8001-3b5fed8c9dd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.190
+ 100.64.57.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690788895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ be89ae70-2f74-11ee-8001-3b5fed8c9dd3
+
+
+
diff --git a/graph/incidents_graphml/b/be8aefb0-3e56-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/b/be8aefb0-3e56-11ee-9b4e-c562a9c40af9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..677374fd07deb29bf7d56b8fc7f1b4fba780a29e
--- /dev/null
+++ b/graph/incidents_graphml/b/be8aefb0-3e56-11ee-9b4e-c562a9c40af9.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.167
+ 100.64.18.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.36.31
+ 100.64.36.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692425277
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be8aefb0-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425277
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be8aefb0-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425277
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be8aefb0-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425277
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ be8aefb0-3e56-11ee-9b4e-c562a9c40af9
+
+
+
diff --git a/graph/incidents_graphml/b/bea329e0-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/b/bea329e0-2f74-11ee-8001-3b5fed8c9dd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..035987c62d63d4da85f8c76eb892945926e69166
--- /dev/null
+++ b/graph/incidents_graphml/b/bea329e0-2f74-11ee-8001-3b5fed8c9dd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.190
+ 100.64.57.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690788895
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bea329e0-2f74-11ee-8001-3b5fed8c9dd3
+
+
+
diff --git a/graph/incidents_graphml/b/beadeed0-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/beadeed0-4220-11ed-8199-49d89c688a9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4affb06504de2634649e188855a4156d9c14681
--- /dev/null
+++ b/graph/incidents_graphml/b/beadeed0-4220-11ed-8199-49d89c688a9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.34
+ 100.64.87.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1664694392
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ beadeed0-4220-11ed-8199-49d89c688a9c
+
+
+
diff --git a/graph/incidents_graphml/b/beb2a9c0-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/beb2a9c0-4220-11ed-8199-49d89c688a9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0042084adfde4050dd60cccaa9dcaba87e241ea8
--- /dev/null
+++ b/graph/incidents_graphml/b/beb2a9c0-4220-11ed-8199-49d89c688a9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.34
+ 100.64.87.34
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664694392
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ beb2a9c0-4220-11ed-8199-49d89c688a9c
+
+
+
diff --git a/graph/incidents_graphml/b/beb79170-a060-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/b/beb79170-a060-11ee-9181-41cbe26a7b16.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1756c8daf440669a57b38209f603648a20f7381
--- /dev/null
+++ b/graph/incidents_graphml/b/beb79170-a060-11ee-9181-41cbe26a7b16.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.42
+ 100.64.68.42
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1703204787
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ beb79170-a060-11ee-9181-41cbe26a7b16
+
+
+ INCIDENT_LINK
+ 1703204787
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ beb79170-a060-11ee-9181-41cbe26a7b16
+
+
+
diff --git a/graph/incidents_graphml/b/beb82800-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/beb82800-4220-11ed-8199-49d89c688a9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b4327b8e0d8b0de6d22887edd9c733c0588e11d
--- /dev/null
+++ b/graph/incidents_graphml/b/beb82800-4220-11ed-8199-49d89c688a9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.223
+ 100.64.58.223
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1664694392
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ beb82800-4220-11ed-8199-49d89c688a9c
+
+
+
diff --git a/graph/incidents_graphml/b/bec4f940-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bec4f940-4220-11ed-8199-49d89c688a9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3395e4f0c82cd7a4688a0bf2f366b3cc07d9c282
--- /dev/null
+++ b/graph/incidents_graphml/b/bec4f940-4220-11ed-8199-49d89c688a9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.58.223
+ 100.64.58.223
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664694392
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bec4f940-4220-11ed-8199-49d89c688a9c
+
+
+
diff --git a/graph/incidents_graphml/b/bed1b450-2b35-11ef-be20-e314b24e9951.graphml b/graph/incidents_graphml/b/bed1b450-2b35-11ef-be20-e314b24e9951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67ecf464b7b08b786e0085bd7c0acc9dfc433746
--- /dev/null
+++ b/graph/incidents_graphml/b/bed1b450-2b35-11ef-be20-e314b24e9951.graphml
@@ -0,0 +1,867 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.245
+ 100.64.91.245
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.246
+ 100.64.91.246
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.165
+ 100.64.10.165
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.247
+ 100.64.91.247
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.116
+ 100.64.31.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.70
+ 100.64.60.70
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.248
+ USER-0015-2078.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.249
+ 100.64.91.249
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.76
+ 100.64.64.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.250
+ 100.64.91.250
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.251
+ 100.64.91.251
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.105
+ 100.64.15.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.135
+ 100.64.59.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.252
+ 100.64.91.252
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.84.42
+ 100.64.84.42
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.253
+ USER-0015-2079.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.227
+ 100.64.63.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 100.64.88.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.254
+ 100.64.91.254
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.69
+ 100.64.4.69
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+ INCIDENT_LINK
+ 1718469530
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bed1b450-2b35-11ef-be20-e314b24e9951
+
+
+
diff --git a/graph/incidents_graphml/b/bedadcf0-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/b/bedadcf0-be7c-11ed-9564-3d773f19984f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..551991d898ea7f3b6ee08ceacaa5634369910663
--- /dev/null
+++ b/graph/incidents_graphml/b/bedadcf0-be7c-11ed-9564-3d773f19984f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.62
+ 100.64.21.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678367850
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bedadcf0-be7c-11ed-9564-3d773f19984f
+
+
+
diff --git a/graph/incidents_graphml/b/bedca6e0-fe94-11ed-a08d-35e4f0a9a870.graphml b/graph/incidents_graphml/b/bedca6e0-fe94-11ed-a08d-35e4f0a9a870.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..540833e536aa43062acb0476cd3133d816c4b94c
--- /dev/null
+++ b/graph/incidents_graphml/b/bedca6e0-fe94-11ed-a08d-35e4f0a9a870.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.19.83
+ 100.64.19.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685415033
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bedca6e0-fe94-11ed-a08d-35e4f0a9a870
+
+
+
diff --git a/graph/incidents_graphml/b/bedd26e0-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/b/bedd26e0-be7c-11ed-9564-3d773f19984f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fee5c23b2433577c92083ec3b3891d9c592100e0
--- /dev/null
+++ b/graph/incidents_graphml/b/bedd26e0-be7c-11ed-9564-3d773f19984f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.127
+ 100.64.83.127
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678367850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bedd26e0-be7c-11ed-9564-3d773f19984f
+
+
+
diff --git a/graph/incidents_graphml/b/bee0f770-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/b/bee0f770-be7c-11ed-9564-3d773f19984f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80e26c4350e807e7382059c1db41fa04daf92013
--- /dev/null
+++ b/graph/incidents_graphml/b/bee0f770-be7c-11ed-9564-3d773f19984f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.83.127
+ 100.64.83.127
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678367850
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bee0f770-be7c-11ed-9564-3d773f19984f
+
+
+
diff --git a/graph/incidents_graphml/b/bee36870-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/b/bee36870-be7c-11ed-9564-3d773f19984f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d887548dee4e608a32ba7aa7dd96be04c9edc985
--- /dev/null
+++ b/graph/incidents_graphml/b/bee36870-be7c-11ed-9564-3d773f19984f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.237
+ 100.64.83.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678367850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bee36870-be7c-11ed-9564-3d773f19984f
+
+
+
diff --git a/graph/incidents_graphml/b/bee64f80-e280-11ee-bdbd-61ca27aa8970.graphml b/graph/incidents_graphml/b/bee64f80-e280-11ee-bdbd-61ca27aa8970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9574d043e1d20df1e0812a96d6592b7ce968bd3f
--- /dev/null
+++ b/graph/incidents_graphml/b/bee64f80-e280-11ee-bdbd-61ca27aa8970.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.207
+ 100.64.56.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.179
+ 100.64.21.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.230
+ 100.64.14.230
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.8
+ 100.64.46.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710475308
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bee64f80-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475308
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bee64f80-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475308
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bee64f80-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475308
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bee64f80-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475308
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bee64f80-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475308
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bee64f80-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475308
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bee64f80-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475308
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bee64f80-e280-11ee-bdbd-61ca27aa8970
+
+
+
diff --git a/graph/incidents_graphml/b/bee73900-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/b/bee73900-be7c-11ed-9564-3d773f19984f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34a7e5a16fe2129caa436f62777240988797d481
--- /dev/null
+++ b/graph/incidents_graphml/b/bee73900-be7c-11ed-9564-3d773f19984f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.83.237
+ 100.64.83.237
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678367850
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bee73900-be7c-11ed-9564-3d773f19984f
+
+
+
diff --git a/graph/incidents_graphml/b/bef01390-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/bef01390-3e29-11ee-b681-89e3497f1d7e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03631310c6a2e1649e8148ecd73e24640f1fe50c
--- /dev/null
+++ b/graph/incidents_graphml/b/bef01390-3e29-11ee-b681-89e3497f1d7e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.122
+ 100.64.15.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692405951
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bef01390-3e29-11ee-b681-89e3497f1d7e
+
+
+
diff --git a/graph/incidents_graphml/b/befc61a0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/b/befc61a0-1c3c-11ed-9dc4-eb234c0496d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d1d1004e800caeb78031c10be7c6326ab462c06
--- /dev/null
+++ b/graph/incidents_graphml/b/befc61a0-1c3c-11ed-9dc4-eb234c0496d2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.38
+ 100.64.78.38
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.144
+ 100.64.72.144
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660528274
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ befc61a0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+ INCIDENT_LINK
+ 1660528274
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ befc61a0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+
diff --git a/graph/incidents_graphml/b/befe5e70-a060-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/b/befe5e70-a060-11ee-9181-41cbe26a7b16.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b836bd5c71b65560a5a115ef9c2d78f82e75bc7
--- /dev/null
+++ b/graph/incidents_graphml/b/befe5e70-a060-11ee-9181-41cbe26a7b16.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.23
+ USER-0015-1491.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1703204787
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ befe5e70-a060-11ee-9181-41cbe26a7b16
+
+
+ INCIDENT_LINK
+ 1703204787
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ befe5e70-a060-11ee-9181-41cbe26a7b16
+
+
+
diff --git a/graph/incidents_graphml/b/bf006740-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/bf006740-3e29-11ee-b681-89e3497f1d7e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36f9b774fc5afe3c02498a92faacaba135282c41
--- /dev/null
+++ b/graph/incidents_graphml/b/bf006740-3e29-11ee-b681-89e3497f1d7e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.122
+ 100.64.15.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692405951
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bf006740-3e29-11ee-b681-89e3497f1d7e
+
+
+
diff --git a/graph/incidents_graphml/b/bf0b3220-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/bf0b3220-edf0-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f209afdef8ad0c1170805e5fed2029bdd469b23
--- /dev/null
+++ b/graph/incidents_graphml/b/bf0b3220-edf0-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.6
+ 100.64.31.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711732874
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf0b3220-edf0-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/b/bf104870-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/b/bf104870-41dc-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..228b756030c9abdf4d95e055269ac7f10f9d0319
--- /dev/null
+++ b/graph/incidents_graphml/b/bf104870-41dc-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.224
+ 100.64.67.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692812684
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bf104870-41dc-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/b/bf1093e0-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/bf1093e0-3e29-11ee-b681-89e3497f1d7e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62485d43654f182716c6997da976a594e24391e0
--- /dev/null
+++ b/graph/incidents_graphml/b/bf1093e0-3e29-11ee-b681-89e3497f1d7e.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.124
+ 100.64.15.124
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692405951
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bf1093e0-3e29-11ee-b681-89e3497f1d7e
+
+
+ INCIDENT_LINK
+ 1692405951
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bf1093e0-3e29-11ee-b681-89e3497f1d7e
+
+
+
diff --git a/graph/incidents_graphml/b/bf1e6c00-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/bf1e6c00-edf0-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ad13bb14e6f587419f55fd4c9552e07370a5234
--- /dev/null
+++ b/graph/incidents_graphml/b/bf1e6c00-edf0-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.6
+ 100.64.31.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1711732875
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bf1e6c00-edf0-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/b/bf2102c0-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/b/bf2102c0-b6de-11ed-9d21-f346d8153a36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5eb6baaadec358860f3298ed035a54ba6cf20e99
--- /dev/null
+++ b/graph/incidents_graphml/b/bf2102c0-b6de-11ed-9d21-f346d8153a36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 100.64.84.158
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677530332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bf2102c0-b6de-11ed-9d21-f346d8153a36
+
+
+
diff --git a/graph/incidents_graphml/b/bf229540-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/bf229540-3e29-11ee-b681-89e3497f1d7e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..526537fc771769b1a0828043c156bdf39f08042d
--- /dev/null
+++ b/graph/incidents_graphml/b/bf229540-3e29-11ee-b681-89e3497f1d7e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.124
+ 100.64.15.124
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692405951
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bf229540-3e29-11ee-b681-89e3497f1d7e
+
+
+
diff --git a/graph/incidents_graphml/b/bf24ac40-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/b/bf24ac40-b6de-11ed-9d21-f346d8153a36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4073cc8786751240589fd00ca36e0316548c9f20
--- /dev/null
+++ b/graph/incidents_graphml/b/bf24ac40-b6de-11ed-9d21-f346d8153a36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677530332
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bf24ac40-b6de-11ed-9d21-f346d8153a36
+
+
+
diff --git a/graph/incidents_graphml/b/bf2500c0-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/b/bf2500c0-1fe1-11ee-80ac-1985e110d782.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..091a406513065cf5bc574a26292ba6545df6332e
--- /dev/null
+++ b/graph/incidents_graphml/b/bf2500c0-1fe1-11ee-80ac-1985e110d782.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.42
+ 100.64.57.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689076493
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bf2500c0-1fe1-11ee-80ac-1985e110d782
+
+
+
diff --git a/graph/incidents_graphml/b/bf251860-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bf251860-16e3-11ed-984f-4116df7b0d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8feb05d09f715d06c5431d29a31edfa57db74d05
--- /dev/null
+++ b/graph/incidents_graphml/b/bf251860-16e3-11ed-984f-4116df7b0d24.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.236
+ 100.64.80.236
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.95
+ 100.64.74.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659940293
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bf251860-16e3-11ed-984f-4116df7b0d24
+
+
+ INCIDENT_LINK
+ 1659940293
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bf251860-16e3-11ed-984f-4116df7b0d24
+
+
+
diff --git a/graph/incidents_graphml/b/bf2ac6e0-fe94-11ed-a08d-35e4f0a9a870.graphml b/graph/incidents_graphml/b/bf2ac6e0-fe94-11ed-a08d-35e4f0a9a870.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0031596adb6497d36da40cae1312b27d175ec2b
--- /dev/null
+++ b/graph/incidents_graphml/b/bf2ac6e0-fe94-11ed-a08d-35e4f0a9a870.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.243
+ 100.64.45.243
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685415033
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bf2ac6e0-fe94-11ed-a08d-35e4f0a9a870
+
+
+
diff --git a/graph/incidents_graphml/b/bf2ee6c0-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/bf2ee6c0-edf0-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..edf21629b29c9a7388d1417dee818c0981970332
--- /dev/null
+++ b/graph/incidents_graphml/b/bf2ee6c0-edf0-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.161
+ 100.64.45.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711732875
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bf2ee6c0-edf0-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/b/bf43cd20-fe94-11ed-a08d-35e4f0a9a870.graphml b/graph/incidents_graphml/b/bf43cd20-fe94-11ed-a08d-35e4f0a9a870.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3fdc1a3325960af7e1fe8150f8c7dcd8dcc38f5b
--- /dev/null
+++ b/graph/incidents_graphml/b/bf43cd20-fe94-11ed-a08d-35e4f0a9a870.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.45.243
+ 100.64.45.243
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685415033
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ bf43cd20-fe94-11ed-a08d-35e4f0a9a870
+
+
+
diff --git a/graph/incidents_graphml/b/bf4b9680-edf0-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/b/bf4b9680-edf0-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b91e4f2b4160c3e807ad92460b8bdcbb768a70c1
--- /dev/null
+++ b/graph/incidents_graphml/b/bf4b9680-edf0-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.161
+ 100.64.45.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711732875
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bf4b9680-edf0-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/b/bf5ae970-0be4-11ef-ba5f-4140e81db4cb.graphml b/graph/incidents_graphml/b/bf5ae970-0be4-11ef-ba5f-4140e81db4cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35bd354d12fab6236ed08902477fca3787498f83
--- /dev/null
+++ b/graph/incidents_graphml/b/bf5ae970-0be4-11ef-ba5f-4140e81db4cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.18
+ 100.64.89.18
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1715026256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bf5ae970-0be4-11ef-ba5f-4140e81db4cb
+
+
+
diff --git a/graph/incidents_graphml/b/bf765a90-3e29-11ee-b681-89e3497f1d7e.graphml b/graph/incidents_graphml/b/bf765a90-3e29-11ee-b681-89e3497f1d7e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36e7efb44a342ab8e4dca79aadd384afaaa0ee25
--- /dev/null
+++ b/graph/incidents_graphml/b/bf765a90-3e29-11ee-b681-89e3497f1d7e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.126
+ 100.64.15.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692405952
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bf765a90-3e29-11ee-b681-89e3497f1d7e
+
+
+
diff --git a/graph/incidents_graphml/b/bf77a770-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bf77a770-4220-11ed-8199-49d89c688a9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38a33ee98f0ab1e2f8e70c696b1e6a11a636cce6
--- /dev/null
+++ b/graph/incidents_graphml/b/bf77a770-4220-11ed-8199-49d89c688a9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.83.34
+ 100.64.83.34
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664694393
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bf77a770-4220-11ed-8199-49d89c688a9c
+
+
+
diff --git a/graph/incidents_graphml/b/bf77c790-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/b/bf77c790-50a8-11ee-9ae0-a3d3a7298a83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30ffd83da23993029450cd675360189ec3e2b6d8
--- /dev/null
+++ b/graph/incidents_graphml/b/bf77c790-50a8-11ee-9ae0-a3d3a7298a83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.101
+ 100.64.27.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694439619
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bf77c790-50a8-11ee-9ae0-a3d3a7298a83
+
+
+
diff --git a/graph/incidents_graphml/b/bf7cfea0-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bf7cfea0-4220-11ed-8199-49d89c688a9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ce46b80b7a144645185de0b08b613a99b6485bd
--- /dev/null
+++ b/graph/incidents_graphml/b/bf7cfea0-4220-11ed-8199-49d89c688a9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.39
+ 100.64.87.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.84.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664694393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bf7cfea0-4220-11ed-8199-49d89c688a9c
+
+
+
diff --git a/graph/incidents_graphml/b/bf81e0a0-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bf81e0a0-4220-11ed-8199-49d89c688a9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4cb480a9003d39e632baa2ead5e3ca8fd44ff61
--- /dev/null
+++ b/graph/incidents_graphml/b/bf81e0a0-4220-11ed-8199-49d89c688a9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.84.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.39
+ 100.64.87.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664694393
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bf81e0a0-4220-11ed-8199-49d89c688a9c
+
+
+
diff --git a/graph/incidents_graphml/b/bf835460-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/b/bf835460-f613-11ed-a3d6-ad85d59eee66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d606d7eb5aad227a51105dff07ab3199b57b7cbf
--- /dev/null
+++ b/graph/incidents_graphml/b/bf835460-f613-11ed-a3d6-ad85d59eee66.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.252
+ 100.64.9.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.181
+ HOST-14580
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.21.5
+ 100.64.21.5
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1684480019
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf835460-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480019
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf835460-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480019
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf835460-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480019
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf835460-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480019
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf835460-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480019
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf835460-f613-11ed-a3d6-ad85d59eee66
+
+
+
diff --git a/graph/incidents_graphml/b/bf8731e0-f6a1-11ee-8b23-bde5dce38992.graphml b/graph/incidents_graphml/b/bf8731e0-f6a1-11ee-8b23-bde5dce38992.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1aa28f0e4e67e5d188497b0f48a0f2c88a1f02ad
--- /dev/null
+++ b/graph/incidents_graphml/b/bf8731e0-f6a1-11ee-8b23-bde5dce38992.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.20
+ 100.64.22.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712688505
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bf8731e0-f6a1-11ee-8b23-bde5dce38992
+
+
+
diff --git a/graph/incidents_graphml/b/bf8c8130-3e56-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/b/bf8c8130-3e56-11ee-9b4e-c562a9c40af9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77f0d47168956cd9b569a5d0d757e7b80083e035
--- /dev/null
+++ b/graph/incidents_graphml/b/bf8c8130-3e56-11ee-9b4e-c562a9c40af9.graphml
@@ -0,0 +1,177 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.155
+ 100.64.7.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692425279
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf8c8130-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425279
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf8c8130-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425279
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf8c8130-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425279
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf8c8130-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425279
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf8c8130-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425279
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf8c8130-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425279
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf8c8130-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425279
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf8c8130-3e56-11ee-9b4e-c562a9c40af9
+
+
+
diff --git a/graph/incidents_graphml/b/bf9cf570-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/b/bf9cf570-2ebf-11ee-9131-1117bdeaaaa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d208594d422070dbe63deda7e0d8afa9d93b8160
--- /dev/null
+++ b/graph/incidents_graphml/b/bf9cf570-2ebf-11ee-9131-1117bdeaaaa3.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.16
+ 100.64.9.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.115
+ 100.64.72.115
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.21.54
+ 100.64.21.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.19.170
+ 100.64.19.170
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.116
+ 100.64.72.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.42
+ 100.64.11.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.46.236
+ 100.64.46.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.117
+ 100.64.72.117
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711158
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bf9cf570-2ebf-11ee-9131-1117bdeaaaa3
+
+
+
diff --git a/graph/incidents_graphml/b/bfa3fff0-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/b/bfa3fff0-ebef-11ec-9679-75d3d6184114.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eaceb5f9c91dc1524735910586a53e8f35136c0e
--- /dev/null
+++ b/graph/incidents_graphml/b/bfa3fff0-ebef-11ec-9679-75d3d6184114.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.7
+ USER-0015-1829.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.255
+ 100.64.73.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655217548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfa3fff0-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfa3fff0-ebef-11ec-9679-75d3d6184114
+
+
+
diff --git a/graph/incidents_graphml/b/bfa7be20-22d3-11ef-b7cc-27d8681b231b.graphml b/graph/incidents_graphml/b/bfa7be20-22d3-11ef-b7cc-27d8681b231b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a5fb739bb19f6be8c252e8e4b51e8eea117275b
--- /dev/null
+++ b/graph/incidents_graphml/b/bfa7be20-22d3-11ef-b7cc-27d8681b231b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.199
+ 100.64.48.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ INCIDENT_LINK
+ 1717547832
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfa7be20-22d3-11ef-b7cc-27d8681b231b
+
+
+
diff --git a/graph/incidents_graphml/b/bfae9000-f6a1-11ee-8b23-bde5dce38992.graphml b/graph/incidents_graphml/b/bfae9000-f6a1-11ee-8b23-bde5dce38992.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4a7b02a5d2a7cde685070aec449a6cc065fb2f5
--- /dev/null
+++ b/graph/incidents_graphml/b/bfae9000-f6a1-11ee-8b23-bde5dce38992.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.22
+ 100.64.22.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.23
+ 100.64.22.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.154
+ 100.64.19.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.24
+ 100.64.22.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.198
+ 100.64.14.198
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.22.25
+ 100.64.22.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.26
+ 100.64.22.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.122
+ 100.64.18.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.27
+ 100.64.22.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.28
+ 100.64.22.28
+ []
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.29
+ 100.64.22.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.30
+ 100.64.22.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.11.212
+ 100.64.11.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.31
+ 100.64.22.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.32
+ 100.64.22.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.25
+ 100.64.20.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.33
+ 100.64.22.33
+ []
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.16.135
+ 100.64.16.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+ INCIDENT_LINK
+ 1712688506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfae9000-f6a1-11ee-8b23-bde5dce38992
+
+
+
diff --git a/graph/incidents_graphml/b/bfb66630-294c-11ef-a020-fd333ff9534c.graphml b/graph/incidents_graphml/b/bfb66630-294c-11ef-a020-fd333ff9534c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e12a67fb55a1db0759cef4f98f0de3c9877c778
--- /dev/null
+++ b/graph/incidents_graphml/b/bfb66630-294c-11ef-a020-fd333ff9534c.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.199
+ 100.64.65.199
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.200
+ 100.64.65.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.40
+ 100.64.18.40
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718259508
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfb66630-294c-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259508
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfb66630-294c-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259508
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfb66630-294c-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259508
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfb66630-294c-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259508
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfb66630-294c-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259508
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfb66630-294c-11ef-a020-fd333ff9534c
+
+
+
diff --git a/graph/incidents_graphml/b/bfbaf200-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bfbaf200-4220-11ed-8199-49d89c688a9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99935b727cfc3e77c8201a5933c1dfbb9af5d026
--- /dev/null
+++ b/graph/incidents_graphml/b/bfbaf200-4220-11ed-8199-49d89c688a9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.41
+ 100.64.87.41
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.84.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664694394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfbaf200-4220-11ed-8199-49d89c688a9c
+
+
+
diff --git a/graph/incidents_graphml/b/bfbb05c0-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/b/bfbb05c0-e0ed-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c29ab7a388cae56fc1e164e4b3182c0d6da60ae6
--- /dev/null
+++ b/graph/incidents_graphml/b/bfbb05c0-e0ed-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.39
+ 100.64.39.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710302222
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfbb05c0-e0ed-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/b/bfbe2070-39e0-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/b/bfbe2070-39e0-11ee-b92b-37d2cd449a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..535bf2bf1cb54911a81ab3395fd00b49d9a32b6a
--- /dev/null
+++ b/graph/incidents_graphml/b/bfbe2070-39e0-11ee-b92b-37d2cd449a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.31
+ 100.64.4.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691934794
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfbe2070-39e0-11ee-b92b-37d2cd449a32
+
+
+
diff --git a/graph/incidents_graphml/b/bfbf85e0-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bfbf85e0-4220-11ed-8199-49d89c688a9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36a13718a19d7d4438aeee7ecb7821ee6e1ff5da
--- /dev/null
+++ b/graph/incidents_graphml/b/bfbf85e0-4220-11ed-8199-49d89c688a9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.84.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.41
+ 100.64.87.41
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664694394
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bfbf85e0-4220-11ed-8199-49d89c688a9c
+
+
+
diff --git a/graph/incidents_graphml/b/bfc09e20-1133-11ee-a919-7371bcc8a8e4.graphml b/graph/incidents_graphml/b/bfc09e20-1133-11ee-a919-7371bcc8a8e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee1b8f9d9a507e36de67ad22a07d84bfc51105d4
--- /dev/null
+++ b/graph/incidents_graphml/b/bfc09e20-1133-11ee-a919-7371bcc8a8e4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.212
+ 100.64.3.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfc09e20-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfc09e20-1133-11ee-a919-7371bcc8a8e4
+
+
+
diff --git a/graph/incidents_graphml/b/bfc88690-4220-11ed-8199-49d89c688a9c.graphml b/graph/incidents_graphml/b/bfc88690-4220-11ed-8199-49d89c688a9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9625fd1c51c4fcac2b512be3636a70ddfa564ee
--- /dev/null
+++ b/graph/incidents_graphml/b/bfc88690-4220-11ed-8199-49d89c688a9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.43
+ 100.64.87.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1664694394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bfc88690-4220-11ed-8199-49d89c688a9c
+
+
+
diff --git a/graph/incidents_graphml/b/bfccf120-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/b/bfccf120-16e3-11ed-984f-4116df7b0d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a116ea61ac0c88549058b2eb7588d201a85d7b6
--- /dev/null
+++ b/graph/incidents_graphml/b/bfccf120-16e3-11ed-984f-4116df7b0d24.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.237
+ 100.64.80.237
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.240
+ 100.64.1.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659940294
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfccf120-16e3-11ed-984f-4116df7b0d24
+
+
+ INCIDENT_LINK
+ 1659940294
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfccf120-16e3-11ed-984f-4116df7b0d24
+
+
+
diff --git a/graph/incidents_graphml/b/bfcf9f30-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/b/bfcf9f30-e0ed-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6707ac5bd8e780823af81656e03afc31dce59951
--- /dev/null
+++ b/graph/incidents_graphml/b/bfcf9f30-e0ed-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.39
+ 100.64.39.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710302222
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ bfcf9f30-e0ed-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/b/bfd78840-1b49-11ee-80b5-4fc6a3f1abdb.graphml b/graph/incidents_graphml/b/bfd78840-1b49-11ee-80b5-4fc6a3f1abdb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da821b5d5a37717d9a556262eb61d6ffbf5dfc88
--- /dev/null
+++ b/graph/incidents_graphml/b/bfd78840-1b49-11ee-80b5-4fc6a3f1abdb.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.166
+ 100.64.13.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.167
+ 100.64.13.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.168
+ USER-0015-1201.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.169
+ 100.64.13.169
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd78840-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd78840-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd78840-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd78840-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd78840-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd78840-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd78840-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd78840-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+
diff --git a/graph/incidents_graphml/b/bfd7a890-1133-11ee-a919-7371bcc8a8e4.graphml b/graph/incidents_graphml/b/bfd7a890-1133-11ee-a919-7371bcc8a8e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff8de2c26b43269ce7b67b8062c5e3d230087ea1
--- /dev/null
+++ b/graph/incidents_graphml/b/bfd7a890-1133-11ee-a919-7371bcc8a8e4.graphml
@@ -0,0 +1,351 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.241
+ 100.64.46.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.139
+ 100.64.47.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.169
+ 100.64.22.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.55
+ 100.64.37.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.214
+ 100.64.10.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.69
+ 100.64.55.69
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.70
+ 100.64.55.70
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.127
+ 100.64.18.127
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+ INCIDENT_LINK
+ 1687462445
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfd7a890-1133-11ee-a919-7371bcc8a8e4
+
+
+
diff --git a/graph/incidents_graphml/b/bfe48090-1b49-11ee-80b5-4fc6a3f1abdb.graphml b/graph/incidents_graphml/b/bfe48090-1b49-11ee-80b5-4fc6a3f1abdb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06be25d53859f1c0e0b6c3905bfcbfb3740c9e63
--- /dev/null
+++ b/graph/incidents_graphml/b/bfe48090-1b49-11ee-80b5-4fc6a3f1abdb.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.174
+ 100.64.13.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.175
+ 100.64.13.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfe48090-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfe48090-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfe48090-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfe48090-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfe48090-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571406
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ bfe48090-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+
diff --git a/graph/incidents_graphml/b/bff2e040-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/b/bff2e040-41dc-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bfdb13197036bac5c4055a1f07935b54da7b469b
--- /dev/null
+++ b/graph/incidents_graphml/b/bff2e040-41dc-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.67
+ 100.64.17.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692812686
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bff2e040-41dc-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/b/bffd8510-cf6a-11ee-91bc-e1cf8103bf6f.graphml b/graph/incidents_graphml/b/bffd8510-cf6a-11ee-91bc-e1cf8103bf6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b1268f5bac056037ce132ad0b9540c793749f17d
--- /dev/null
+++ b/graph/incidents_graphml/b/bffd8510-cf6a-11ee-91bc-e1cf8103bf6f.graphml
@@ -0,0 +1,229 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.112
+ 100.64.52.112
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.37
+ 100.64.23.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.113
+ 100.64.52.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.114
+ 100.64.52.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708376789
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bffd8510-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376789
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bffd8510-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376789
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bffd8510-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376789
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bffd8510-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376789
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bffd8510-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376789
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bffd8510-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376789
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bffd8510-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376789
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bffd8510-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376789
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bffd8510-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+ INCIDENT_LINK
+ 1708376789
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ bffd8510-cf6a-11ee-91bc-e1cf8103bf6f
+
+
+
diff --git a/graph/incidents_graphml/c/c0030ce0-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c0030ce0-41dc-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e573597cffc5f7dab06ef1374f16f46075c09d5
--- /dev/null
+++ b/graph/incidents_graphml/c/c0030ce0-41dc-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.67
+ 100.64.17.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692812686
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c0030ce0-41dc-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c00c13c0-3d36-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/c/c00c13c0-3d36-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd067d269b82650583f1c7ea98adb97e0f6f9dc6
--- /dev/null
+++ b/graph/incidents_graphml/c/c00c13c0-3d36-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,177 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ USER-0015-1979.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.49
+ USER-0015-2063.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.46.208
+ USER-0015-1982.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.50
+ 100.64.91.50
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720449083
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c00c13c0-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720449083
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c00c13c0-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720449083
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c00c13c0-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720449083
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c00c13c0-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720449083
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c00c13c0-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720449083
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c00c13c0-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720449083
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c00c13c0-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720449083
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c00c13c0-3d36-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/c/c011d7c0-e560-11ee-be14-8bb84b2c14a8.graphml b/graph/incidents_graphml/c/c011d7c0-e560-11ee-be14-8bb84b2c14a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef62892f864bf4cd6bb5b7cf980b249220493f18
--- /dev/null
+++ b/graph/incidents_graphml/c/c011d7c0-e560-11ee-be14-8bb84b2c14a8.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.67
+ 100.64.24.67
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.14.222
+ 100.64.14.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.17.101
+ 100.64.17.101
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710791419
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c011d7c0-e560-11ee-be14-8bb84b2c14a8
+
+
+ INCIDENT_LINK
+ 1710791419
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c011d7c0-e560-11ee-be14-8bb84b2c14a8
+
+
+ INCIDENT_LINK
+ 1710791419
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c011d7c0-e560-11ee-be14-8bb84b2c14a8
+
+
+ INCIDENT_LINK
+ 1710791419
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c011d7c0-e560-11ee-be14-8bb84b2c14a8
+
+
+ INCIDENT_LINK
+ 1710791419
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c011d7c0-e560-11ee-be14-8bb84b2c14a8
+
+
+ INCIDENT_LINK
+ 1710791419
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c011d7c0-e560-11ee-be14-8bb84b2c14a8
+
+
+
diff --git a/graph/incidents_graphml/c/c016a8f0-0cf7-11ee-aa7f-c3325e1e3407.graphml b/graph/incidents_graphml/c/c016a8f0-0cf7-11ee-aa7f-c3325e1e3407.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f8d5816b6ba8234ad70f22ed8845c6b31ed5966
--- /dev/null
+++ b/graph/incidents_graphml/c/c016a8f0-0cf7-11ee-aa7f-c3325e1e3407.graphml
@@ -0,0 +1,553 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.132
+ 100.64.33.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.208
+ 100.64.73.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.80
+ 100.64.71.80
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.14.77
+ 100.64.14.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.29.19
+ 100.64.29.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.47.247
+ 100.64.47.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.37.145
+ 100.64.37.145
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.63
+ USER-0015-1644.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.8.30
+ 100.64.8.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.64.11
+ 100.64.64.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.67
+ 100.64.75.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.25.50
+ 100.64.25.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.68
+ 100.64.75.68
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.55.82
+ 100.64.55.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.69
+ 100.64.75.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c016a8f0-0cf7-11ee-aa7f-c3325e1e3407
+
+
+
diff --git a/graph/incidents_graphml/c/c01803e0-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/c/c01803e0-16e3-11ed-984f-4116df7b0d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7272b17eb1d77f87a7642227655d7c2f7a60ac3
--- /dev/null
+++ b/graph/incidents_graphml/c/c01803e0-16e3-11ed-984f-4116df7b0d24.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.238
+ 100.64.80.238
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659940295
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01803e0-16e3-11ed-984f-4116df7b0d24
+
+
+ INCIDENT_LINK
+ 1659940295
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01803e0-16e3-11ed-984f-4116df7b0d24
+
+
+
diff --git a/graph/incidents_graphml/c/c01b5710-dfa1-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/c/c01b5710-dfa1-11ee-9120-ff7b7094ac3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1bc0d1fa0ba287cc0656e54756f1c0beac163172
--- /dev/null
+++ b/graph/incidents_graphml/c/c01b5710-dfa1-11ee-9120-ff7b7094ac3d.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.224
+ 100.64.36.224
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.12.236
+ 100.64.12.236
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.182
+ 100.64.70.182
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.183
+ 100.64.70.183
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.184
+ 100.64.70.184
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710159630
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01b5710-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159630
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01b5710-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159630
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01b5710-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159630
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01b5710-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159630
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01b5710-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159630
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01b5710-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159630
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01b5710-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159630
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01b5710-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159630
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01b5710-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159630
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01b5710-dfa1-11ee-9120-ff7b7094ac3d
+
+
+
diff --git a/graph/incidents_graphml/c/c01f2d80-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c01f2d80-8de5-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63df94ca0c0d7eb32b1ea59b9165ac3e6d113a3c
--- /dev/null
+++ b/graph/incidents_graphml/c/c01f2d80-8de5-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.112
+ 100.64.64.112
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701172840
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c01f2d80-8de5-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/c02ff660-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c02ff660-8de5-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff67ab9794c1932e0ae7e0f204310ca18f6feff5
--- /dev/null
+++ b/graph/incidents_graphml/c/c02ff660-8de5-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.112
+ 100.64.64.112
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701172840
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c02ff660-8de5-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/c0308960-3e56-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/c/c0308960-3e56-11ee-9b4e-c562a9c40af9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f45a6706395f7846c5e4da897eb7b14685f48fb
--- /dev/null
+++ b/graph/incidents_graphml/c/c0308960-3e56-11ee-9b4e-c562a9c40af9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.118
+ 100.64.12.118
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692425280
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0308960-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425280
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0308960-3e56-11ee-9b4e-c562a9c40af9
+
+
+
diff --git a/graph/incidents_graphml/c/c032bc70-0cf7-11ee-aa7f-c3325e1e3407.graphml b/graph/incidents_graphml/c/c032bc70-0cf7-11ee-aa7f-c3325e1e3407.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04de890b27ba2365327e979f41ca5c00f7cf854e
--- /dev/null
+++ b/graph/incidents_graphml/c/c032bc70-0cf7-11ee-aa7f-c3325e1e3407.graphml
@@ -0,0 +1,279 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.70
+ 100.64.75.70
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.51
+ 100.64.1.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.172
+ 100.64.72.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.71
+ 100.64.75.71
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.72
+ 100.64.75.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.65.32
+ 100.64.65.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.77
+ 100.64.72.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+ INCIDENT_LINK
+ 1686996871
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c032bc70-0cf7-11ee-aa7f-c3325e1e3407
+
+
+
diff --git a/graph/incidents_graphml/c/c0430900-18e9-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/c/c0430900-18e9-11ef-94b0-d3858c4ed3ac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8216aa19aee2e43fd12f55e998b478e7c5108a58
--- /dev/null
+++ b/graph/incidents_graphml/c/c0430900-18e9-11ef-94b0-d3858c4ed3ac.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.248
+ 100.64.17.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.859375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.238.61
+ 172.30.238.61
+ ["Exploiting Target","Exploiting Host"]
+ 0.859375
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1716457770
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0430900-18e9-11ef-94b0-d3858c4ed3ac
+
+
+ INCIDENT_LINK
+ 1716457770
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0430900-18e9-11ef-94b0-d3858c4ed3ac
+
+
+
diff --git a/graph/incidents_graphml/c/c05130d0-4ea9-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/c/c05130d0-4ea9-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0bb22b6431c87c952e3d250e74f668dc75211875
--- /dev/null
+++ b/graph/incidents_graphml/c/c05130d0-4ea9-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694220147
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c05130d0-4ea9-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/c/c061cf20-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/c/c061cf20-21fe-11ef-a065-0d11f2930c39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abc1c73d4e6e4970c29d4f38b2ac8d4d5d7c73bd
--- /dev/null
+++ b/graph/incidents_graphml/c/c061cf20-21fe-11ef-a065-0d11f2930c39.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.67
+ 100.64.24.67
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717456350
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c061cf20-21fe-11ef-a065-0d11f2930c39
+
+
+
diff --git a/graph/incidents_graphml/c/c0648060-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c0648060-789b-11ee-8d62-1fa49ad9521f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f28c719b39c68614428cfc532efe101e53b96d2
--- /dev/null
+++ b/graph/incidents_graphml/c/c0648060-789b-11ee-8d62-1fa49ad9521f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.140
+ 100.64.30.140
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698832083
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0648060-789b-11ee-8d62-1fa49ad9521f
+
+
+
diff --git a/graph/incidents_graphml/c/c07122f0-0e2a-11ef-801a-2fb46581ffa8.graphml b/graph/incidents_graphml/c/c07122f0-0e2a-11ef-801a-2fb46581ffa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..faa91271881f5ec257d335fcd8dd03b4ab761727
--- /dev/null
+++ b/graph/incidents_graphml/c/c07122f0-0e2a-11ef-801a-2fb46581ffa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.250
+ 100.64.14.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715276225
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c07122f0-0e2a-11ef-801a-2fb46581ffa8
+
+
+
diff --git a/graph/incidents_graphml/c/c0753010-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/c/c0753010-21fe-11ef-a065-0d11f2930c39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83c50986afb04047e7603542e1478b4f526e27f5
--- /dev/null
+++ b/graph/incidents_graphml/c/c0753010-21fe-11ef-a065-0d11f2930c39.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.67
+ 100.64.24.67
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717456350
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c0753010-21fe-11ef-a065-0d11f2930c39
+
+
+
diff --git a/graph/incidents_graphml/c/c0787d90-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c0787d90-789b-11ee-8d62-1fa49ad9521f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb315474d94e3a2e3cc6a382545f8f0ab05fd995
--- /dev/null
+++ b/graph/incidents_graphml/c/c0787d90-789b-11ee-8d62-1fa49ad9521f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.140
+ 100.64.30.140
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698832084
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c0787d90-789b-11ee-8d62-1fa49ad9521f
+
+
+
diff --git a/graph/incidents_graphml/c/c07a2a20-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/c/c07a2a20-b6de-11ed-9d21-f346d8153a36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcf0c54bf081795565ca632f4ae4937548192580
--- /dev/null
+++ b/graph/incidents_graphml/c/c07a2a20-b6de-11ed-9d21-f346d8153a36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.2
+ 100.64.17.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1984.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1677530334
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c07a2a20-b6de-11ed-9d21-f346d8153a36
+
+
+
diff --git a/graph/incidents_graphml/c/c07b80a0-16e3-11ed-984f-4116df7b0d24.graphml b/graph/incidents_graphml/c/c07b80a0-16e3-11ed-984f-4116df7b0d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..617a39c543dc21c337721c1b9c58ef058a5eb3ec
--- /dev/null
+++ b/graph/incidents_graphml/c/c07b80a0-16e3-11ed-984f-4116df7b0d24.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.63
+ 100.64.72.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.39
+ 100.64.1.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659940296
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c07b80a0-16e3-11ed-984f-4116df7b0d24
+
+
+ INCIDENT_LINK
+ 1659940296
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c07b80a0-16e3-11ed-984f-4116df7b0d24
+
+
+
diff --git a/graph/incidents_graphml/c/c07dd3a0-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/c/c07dd3a0-b6de-11ed-9d21-f346d8153a36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e2f8d1d4da8b6626fb0a2a6995f235d2360ea0a
--- /dev/null
+++ b/graph/incidents_graphml/c/c07dd3a0-b6de-11ed-9d21-f346d8153a36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.17.2
+ 100.64.17.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677530334
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c07dd3a0-b6de-11ed-9d21-f346d8153a36
+
+
+
diff --git a/graph/incidents_graphml/c/c083a9b0-2f74-11ee-8001-3b5fed8c9dd3.graphml b/graph/incidents_graphml/c/c083a9b0-2f74-11ee-8001-3b5fed8c9dd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24f85117576f7417fca5fc4b736897bfa3f04e6f
--- /dev/null
+++ b/graph/incidents_graphml/c/c083a9b0-2f74-11ee-8001-3b5fed8c9dd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.192
+ 100.64.57.192
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690788898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c083a9b0-2f74-11ee-8001-3b5fed8c9dd3
+
+
+
diff --git a/graph/incidents_graphml/c/c084fb50-7135-11ee-bce1-87535eed5229.graphml b/graph/incidents_graphml/c/c084fb50-7135-11ee-bce1-87535eed5229.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00a13cc046e98a6aab26839f79158046fa221d87
--- /dev/null
+++ b/graph/incidents_graphml/c/c084fb50-7135-11ee-bce1-87535eed5229.graphml
@@ -0,0 +1,475 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.149
+ 100.64.45.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.24
+ 100.64.24.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.191
+ 100.64.27.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.254
+ 100.64.48.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.152
+ 100.64.8.152
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.104
+ 100.64.64.104
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.197
+ 100.64.7.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.105
+ 100.64.64.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.163
+ 100.64.4.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.153
+ 100.64.8.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.41
+ 100.64.40.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.106
+ 100.64.64.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+ INCIDENT_LINK
+ 1698018617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c084fb50-7135-11ee-bce1-87535eed5229
+
+
+
diff --git a/graph/incidents_graphml/c/c0876bb0-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/c0876bb0-4ceb-11ee-b223-133fe64c82b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dca3f184ab4ad039e3d20f4dcaee9e2d898d69fa
--- /dev/null
+++ b/graph/incidents_graphml/c/c0876bb0-4ceb-11ee-b223-133fe64c82b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694028592
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0876bb0-4ceb-11ee-b223-133fe64c82b5
+
+
+
diff --git a/graph/incidents_graphml/c/c08c4c10-0e2a-11ef-801a-2fb46581ffa8.graphml b/graph/incidents_graphml/c/c08c4c10-0e2a-11ef-801a-2fb46581ffa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..436bd10184f562afdbf8a92594a208c85c707d90
--- /dev/null
+++ b/graph/incidents_graphml/c/c08c4c10-0e2a-11ef-801a-2fb46581ffa8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.230
+ 100.64.41.230
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715276225
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c08c4c10-0e2a-11ef-801a-2fb46581ffa8
+
+
+
diff --git a/graph/incidents_graphml/c/c08d71f0-311a-11ee-87a2-613e036775fd.graphml b/graph/incidents_graphml/c/c08d71f0-311a-11ee-87a2-613e036775fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26a12db180a4a43e5ccdedeef7fee87ff659af57
--- /dev/null
+++ b/graph/incidents_graphml/c/c08d71f0-311a-11ee-87a2-613e036775fd.graphml
@@ -0,0 +1,811 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.79
+ 100.64.58.79
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.56
+ USER-0015-1428.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.167
+ 100.64.54.167
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.50
+ 100.64.58.50
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.51
+ 100.64.58.51
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.52
+ 100.64.58.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.80
+ 100.64.58.80
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.247
+ 100.64.23.247
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.81
+ 100.64.58.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.82
+ 100.64.58.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.83
+ 100.64.58.83
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.227
+ USER-0015-1425.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.84
+ 100.64.58.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.85
+ 100.64.58.85
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.81
+ 100.64.9.81
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.10
+ 100.64.41.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c08d71f0-311a-11ee-87a2-613e036775fd
+
+
+
diff --git a/graph/incidents_graphml/c/c0977140-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/c0977140-4ceb-11ee-b223-133fe64c82b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a59fa3805687af445b0bd7a982996e7b37e6adb0
--- /dev/null
+++ b/graph/incidents_graphml/c/c0977140-4ceb-11ee-b223-133fe64c82b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694028592
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c0977140-4ceb-11ee-b223-133fe64c82b5
+
+
+
diff --git a/graph/incidents_graphml/c/c09babd0-28a0-11ee-a420-712e71e90fc3.graphml b/graph/incidents_graphml/c/c09babd0-28a0-11ee-a420-712e71e90fc3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b1e547bb42f9e88d2d3623da3fd5bd9e88c014b2
--- /dev/null
+++ b/graph/incidents_graphml/c/c09babd0-28a0-11ee-a420-712e71e90fc3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.84
+ 100.64.12.84
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690038138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c09babd0-28a0-11ee-a420-712e71e90fc3
+
+
+
diff --git a/graph/incidents_graphml/c/c09c6230-2b35-11ef-be20-e314b24e9951.graphml b/graph/incidents_graphml/c/c09c6230-2b35-11ef-be20-e314b24e9951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58e14f2ff4a28b67b2a1f3a44e9d0e9b9dd46deb
--- /dev/null
+++ b/graph/incidents_graphml/c/c09c6230-2b35-11ef-be20-e314b24e9951.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.98
+ 100.64.87.98
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718469533
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c09c6230-2b35-11ef-be20-e314b24e9951
+
+
+
diff --git a/graph/incidents_graphml/c/c0a1b890-2dd6-11ef-a033-7190c885d3e4.graphml b/graph/incidents_graphml/c/c0a1b890-2dd6-11ef-a033-7190c885d3e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..141a5a7189b6dc248d73c2455988fdff1a350e58
--- /dev/null
+++ b/graph/incidents_graphml/c/c0a1b890-2dd6-11ef-a033-7190c885d3e4.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.112
+ 100.64.20.112
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.88
+ 100.64.65.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0a1b890-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0a1b890-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0a1b890-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0a1b890-2dd6-11ef-a033-7190c885d3e4
+
+
+
diff --git a/graph/incidents_graphml/c/c0a41ba0-1007-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/c/c0a41ba0-1007-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..01ad19aa88f2baaacea5fc57b61251ce8e72e209
--- /dev/null
+++ b/graph/incidents_graphml/c/c0a41ba0-1007-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.82
+ 100.64.66.82
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687333597
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c0a41ba0-1007-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/c/c0aa1100-4dbe-11ee-b251-912537db6da9.graphml b/graph/incidents_graphml/c/c0aa1100-4dbe-11ee-b251-912537db6da9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..779f7700fa4b63dcbf60cc4ad7d101b64dc98a09
--- /dev/null
+++ b/graph/incidents_graphml/c/c0aa1100-4dbe-11ee-b251-912537db6da9.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.33.70
+ 100.64.33.70
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1694119216
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0aa1100-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119216
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0aa1100-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119216
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0aa1100-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119216
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0aa1100-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119216
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0aa1100-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119216
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0aa1100-4dbe-11ee-b251-912537db6da9
+
+
+
diff --git a/graph/incidents_graphml/c/c0b50e20-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/c0b50e20-1c3c-11ed-9dc4-eb234c0496d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f875f3a211df7a36a89832430acc5954a1cb4a50
--- /dev/null
+++ b/graph/incidents_graphml/c/c0b50e20-1c3c-11ed-9dc4-eb234c0496d2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.39
+ 100.64.78.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.179
+ 100.64.71.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660528277
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0b50e20-1c3c-11ed-9dc4-eb234c0496d2
+
+
+ INCIDENT_LINK
+ 1660528277
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0b50e20-1c3c-11ed-9dc4-eb234c0496d2
+
+
+
diff --git a/graph/incidents_graphml/c/c0ba7e70-28a0-11ee-a420-712e71e90fc3.graphml b/graph/incidents_graphml/c/c0ba7e70-28a0-11ee-a420-712e71e90fc3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5500d408c6b67976682d76fee149dc9ef2ced242
--- /dev/null
+++ b/graph/incidents_graphml/c/c0ba7e70-28a0-11ee-a420-712e71e90fc3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.84
+ 100.64.12.84
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690038139
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c0ba7e70-28a0-11ee-a420-712e71e90fc3
+
+
+
diff --git a/graph/incidents_graphml/c/c0c34a50-2dd6-11ef-a033-7190c885d3e4.graphml b/graph/incidents_graphml/c/c0c34a50-2dd6-11ef-a033-7190c885d3e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b88f2ab9f973b98a81ffa6558f26de92276d6756
--- /dev/null
+++ b/graph/incidents_graphml/c/c0c34a50-2dd6-11ef-a033-7190c885d3e4.graphml
@@ -0,0 +1,301 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.90
+ 100.64.65.90
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.91
+ 100.64.65.91
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.102
+ 100.64.20.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.29
+ 100.64.26.29
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.92
+ 100.64.65.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.93
+ 100.64.65.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c34a50-2dd6-11ef-a033-7190c885d3e4
+
+
+
diff --git a/graph/incidents_graphml/c/c0c72420-4ea9-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/c/c0c72420-4ea9-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5d960889b8f0a93311dc355945de870d59eee42
--- /dev/null
+++ b/graph/incidents_graphml/c/c0c72420-4ea9-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.30
+ 100.64.59.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694220148
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0c72420-4ea9-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/c/c0caaf60-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c0caaf60-57e5-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..525ba6b7127641bd9024b77e4e162456ecc4ca8b
--- /dev/null
+++ b/graph/incidents_graphml/c/c0caaf60-57e5-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.65
+ 100.64.44.65
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695235478
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0caaf60-57e5-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/c/c0d328d0-2dd6-11ef-a033-7190c885d3e4.graphml b/graph/incidents_graphml/c/c0d328d0-2dd6-11ef-a033-7190c885d3e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3b4fa3879279b67425cd6f8c10c103c7efabf756
--- /dev/null
+++ b/graph/incidents_graphml/c/c0d328d0-2dd6-11ef-a033-7190c885d3e4.graphml
@@ -0,0 +1,473 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.98
+ USER-0015-1465.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.131
+ 100.64.46.131
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.93
+ 100.64.23.93
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.60
+ 100.64.35.60
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.65
+ 100.64.8.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.24
+ 100.64.46.24
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.97
+ 100.64.7.97
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.99
+ 100.64.65.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.180
+ 100.64.43.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.100
+ 100.64.65.100
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.6
+ 100.64.49.6
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758585
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0d328d0-2dd6-11ef-a033-7190c885d3e4
+
+
+
diff --git a/graph/incidents_graphml/c/c0d44380-4ea9-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/c/c0d44380-4ea9-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e5a859eebe9c7cd197b2f001fc3c1da71a430be
--- /dev/null
+++ b/graph/incidents_graphml/c/c0d44380-4ea9-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.30
+ 100.64.59.30
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694220148
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c0d44380-4ea9-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/c/c0d77c50-28a0-11ee-a420-712e71e90fc3.graphml b/graph/incidents_graphml/c/c0d77c50-28a0-11ee-a420-712e71e90fc3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c929ae679e58d23cfdfcbdfaef7cf068696ba2b
--- /dev/null
+++ b/graph/incidents_graphml/c/c0d77c50-28a0-11ee-a420-712e71e90fc3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.232
+ USER-0015-1435.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690038139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0d77c50-28a0-11ee-a420-712e71e90fc3
+
+
+
diff --git a/graph/incidents_graphml/c/c0d92e50-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c0d92e50-57e5-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e9e6736dcd6e60bbd35c922a784ed95792f540b
--- /dev/null
+++ b/graph/incidents_graphml/c/c0d92e50-57e5-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.65
+ 100.64.44.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695235479
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c0d92e50-57e5-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/c/c0da2e80-2b35-11ef-be20-e314b24e9951.graphml b/graph/incidents_graphml/c/c0da2e80-2b35-11ef-be20-e314b24e9951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7fcf0a3ae7267df2b260519524ded88927d1d31
--- /dev/null
+++ b/graph/incidents_graphml/c/c0da2e80-2b35-11ef-be20-e314b24e9951.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.46.208
+ 172.16.46.208
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.234
+ USER-0015-2080.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718469534
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c0da2e80-2b35-11ef-be20-e314b24e9951
+
+
+
diff --git a/graph/incidents_graphml/c/c0e09ba0-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c0e09ba0-41dc-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df50c24b95145c13286342828482a9ebda16cfc8
--- /dev/null
+++ b/graph/incidents_graphml/c/c0e09ba0-41dc-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.88
+ 100.64.64.88
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692812688
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0e09ba0-41dc-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c0ed9250-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c0ed9250-e0ed-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d820e2ee19469e97271cf6bc2052e69c63f1ccd6
--- /dev/null
+++ b/graph/incidents_graphml/c/c0ed9250-e0ed-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.43
+ 100.64.39.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710302224
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0ed9250-e0ed-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/c/c0ee86c0-28a0-11ee-a420-712e71e90fc3.graphml b/graph/incidents_graphml/c/c0ee86c0-28a0-11ee-a420-712e71e90fc3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99e95ea3e9135cb2c98e79db92c7ca8e94c34160
--- /dev/null
+++ b/graph/incidents_graphml/c/c0ee86c0-28a0-11ee-a420-712e71e90fc3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.232
+ USER-0015-1435.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690038139
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c0ee86c0-28a0-11ee-a420-712e71e90fc3
+
+
+
diff --git a/graph/incidents_graphml/c/c0f13d70-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c0f13d70-41dc-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d022bc16e58de612175b19df215288da0238a621
--- /dev/null
+++ b/graph/incidents_graphml/c/c0f13d70-41dc-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.88
+ 100.64.64.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692812688
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c0f13d70-41dc-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c0fe35c0-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c0fe35c0-41dc-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4299775b29eebb8a48c3f3eb2ab386044c40da4f
--- /dev/null
+++ b/graph/incidents_graphml/c/c0fe35c0-41dc-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.97
+ 100.64.42.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692812688
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c0fe35c0-41dc-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c107d110-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c107d110-e0ed-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e34772250ffac278d1fd3bedab15ceb170408f3c
--- /dev/null
+++ b/graph/incidents_graphml/c/c107d110-e0ed-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.43
+ 100.64.39.43
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710302224
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c107d110-e0ed-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/c/c10dc620-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c10dc620-41dc-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03196e72e8ff47f3a732b9780a967745357236ea
--- /dev/null
+++ b/graph/incidents_graphml/c/c10dc620-41dc-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.97
+ 100.64.42.97
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692812688
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c10dc620-41dc-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c1100200-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/c/c1100200-210c-11ee-ab17-9db2be59825a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a7e8007aa9aaf39b43f9453bfd376911dd82fd6
--- /dev/null
+++ b/graph/incidents_graphml/c/c1100200-210c-11ee-ab17-9db2be59825a.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.48
+ 100.64.22.48
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.49
+ 100.64.22.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.50
+ 100.64.22.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.51
+ 100.64.22.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.52
+ 100.64.22.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.53
+ 100.64.22.53
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.54
+ 100.64.22.54
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689204915
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1100200-210c-11ee-ab17-9db2be59825a
+
+
+
diff --git a/graph/incidents_graphml/c/c110e440-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/c/c110e440-4ede-11ee-a8d5-451ce28ad892.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..250145c0f0b387dd8cb1fd5b90fb343b0a56db21
--- /dev/null
+++ b/graph/incidents_graphml/c/c110e440-4ede-11ee-a8d5-451ce28ad892.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.178
+ USER-0015-2123.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1694242912
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c110e440-4ede-11ee-a8d5-451ce28ad892
+
+
+
diff --git a/graph/incidents_graphml/c/c11235e0-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/c/c11235e0-6c00-11ee-9973-9b86183b2cfc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c0c770dcf099ae95c6139377ea4f2e0fe5bc85e
--- /dev/null
+++ b/graph/incidents_graphml/c/c11235e0-6c00-11ee-9973-9b86183b2cfc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.66.188
+ 100.64.66.188
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697446099
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c11235e0-6c00-11ee-9973-9b86183b2cfc
+
+
+
diff --git a/graph/incidents_graphml/c/c1134cc0-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c1134cc0-0e89-11ee-9188-256b81e0b008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e88e36675ffef194a4a2a50330191647e890c368
--- /dev/null
+++ b/graph/incidents_graphml/c/c1134cc0-0e89-11ee-9188-256b81e0b008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.182
+ 100.64.38.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687169530
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c1134cc0-0e89-11ee-9188-256b81e0b008
+
+
+
diff --git a/graph/incidents_graphml/c/c118e570-032d-11ee-bd4a-8bf288ff3594.graphml b/graph/incidents_graphml/c/c118e570-032d-11ee-bd4a-8bf288ff3594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f883e177d7b815b57b8bdeae1c158877d411f23
--- /dev/null
+++ b/graph/incidents_graphml/c/c118e570-032d-11ee-bd4a-8bf288ff3594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.51
+ HOST-14856
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.75.254
+ 100.64.75.254
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685920554
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c118e570-032d-11ee-bd4a-8bf288ff3594
+
+
+
diff --git a/graph/incidents_graphml/c/c11a62a0-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/c/c11a62a0-5bee-11ee-82a0-9da780b0dcc4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f0047dda3b64c5e45563955262d4efeae42f434d
--- /dev/null
+++ b/graph/incidents_graphml/c/c11a62a0-5bee-11ee-82a0-9da780b0dcc4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.227
+ 100.64.22.227
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695679149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c11a62a0-5bee-11ee-82a0-9da780b0dcc4
+
+
+
diff --git a/graph/incidents_graphml/c/c12381e0-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/c/c12381e0-4ede-11ee-a8d5-451ce28ad892.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16313eb0f25998e680433b20c38936cafcf526ed
--- /dev/null
+++ b/graph/incidents_graphml/c/c12381e0-4ede-11ee-a8d5-451ce28ad892.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.178
+ USER-0015-2123.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694242912
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c12381e0-4ede-11ee-a8d5-451ce28ad892
+
+
+
diff --git a/graph/incidents_graphml/c/c12a4120-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/c/c12a4120-5bee-11ee-82a0-9da780b0dcc4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e04d2383f190fc3c2e586870bcce4b2aebb70914
--- /dev/null
+++ b/graph/incidents_graphml/c/c12a4120-5bee-11ee-82a0-9da780b0dcc4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.227
+ 100.64.22.227
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695679149
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c12a4120-5bee-11ee-82a0-9da780b0dcc4
+
+
+
diff --git a/graph/incidents_graphml/c/c12cef40-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c12cef40-0e89-11ee-9188-256b81e0b008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3378e76d998c1da30a4fabfb1c2c95772b758564
--- /dev/null
+++ b/graph/incidents_graphml/c/c12cef40-0e89-11ee-9188-256b81e0b008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.184
+ USER-0015-1319.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687169531
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c12cef40-0e89-11ee-9188-256b81e0b008
+
+
+
diff --git a/graph/incidents_graphml/c/c1356450-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/c/c1356450-210c-11ee-ab17-9db2be59825a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..066093d820cf10898cefc5829a2d18c1c0b72b04
--- /dev/null
+++ b/graph/incidents_graphml/c/c1356450-210c-11ee-ab17-9db2be59825a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.48
+ 100.64.22.48
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689204916
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c1356450-210c-11ee-ab17-9db2be59825a
+
+
+
diff --git a/graph/incidents_graphml/c/c13f1ea0-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/c/c13f1ea0-81bf-11ee-967b-47c68907a0bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66a90547936fc71bdea03b0f81accef03017715b
--- /dev/null
+++ b/graph/incidents_graphml/c/c13f1ea0-81bf-11ee-967b-47c68907a0bd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1699837107
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c13f1ea0-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699837107
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c13f1ea0-81bf-11ee-967b-47c68907a0bd
+
+
+
diff --git a/graph/incidents_graphml/c/c1402370-3901-11ed-a60c-6b361c078d45.graphml b/graph/incidents_graphml/c/c1402370-3901-11ed-a60c-6b361c078d45.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a747224247d02c2f09dc46510fbf9680d25b23a5
--- /dev/null
+++ b/graph/incidents_graphml/c/c1402370-3901-11ed-a60c-6b361c078d45.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.4.247
+ 100.64.4.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663691521
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c1402370-3901-11ed-a60c-6b361c078d45
+
+
+
diff --git a/graph/incidents_graphml/c/c140f070-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/c/c140f070-0010-11ef-83c1-e54678fd0000.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be64127d43c3d16de2427ecaef8b8c7e2531bc91
--- /dev/null
+++ b/graph/incidents_graphml/c/c140f070-0010-11ef-83c1-e54678fd0000.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Okta","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.169
+ 100.64.69.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713725743
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c140f070-0010-11ef-83c1-e54678fd0000
+
+
+
diff --git a/graph/incidents_graphml/c/c145dfb0-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c145dfb0-789b-11ee-8d62-1fa49ad9521f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1da4a5d93f6b8be79f7439d64d7baf3c80f5f232
--- /dev/null
+++ b/graph/incidents_graphml/c/c145dfb0-789b-11ee-8d62-1fa49ad9521f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.142
+ 100.64.30.142
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698832085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c145dfb0-789b-11ee-8d62-1fa49ad9521f
+
+
+
diff --git a/graph/incidents_graphml/c/c147ece0-4ea9-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/c/c147ece0-4ea9-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e25fc347924b371b4859560a48e747654705e50a
--- /dev/null
+++ b/graph/incidents_graphml/c/c147ece0-4ea9-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.138
+ 100.64.36.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694220149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c147ece0-4ea9-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/c/c14e5490-ebef-11ec-9679-75d3d6184114.graphml b/graph/incidents_graphml/c/c14e5490-ebef-11ec-9679-75d3d6184114.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95133e0a0fc8fbfd4e4e25948177fd29d628bcdc
--- /dev/null
+++ b/graph/incidents_graphml/c/c14e5490-ebef-11ec-9679-75d3d6184114.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.84.101
+ 192.168.84.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.166
+ 100.64.70.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.8
+ 100.64.80.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.9
+ 100.64.80.9
+ []
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655217551
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c14e5490-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217551
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c14e5490-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217551
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c14e5490-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217551
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c14e5490-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217551
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c14e5490-ebef-11ec-9679-75d3d6184114
+
+
+ INCIDENT_LINK
+ 1655217551
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c14e5490-ebef-11ec-9679-75d3d6184114
+
+
+
diff --git a/graph/incidents_graphml/c/c14e6ee0-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c14e6ee0-24b8-11ef-9f46-91603b00c012.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3772819c5053882973b1fd9cc27bb3916020533d
--- /dev/null
+++ b/graph/incidents_graphml/c/c14e6ee0-24b8-11ef-9f46-91603b00c012.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.242
+ 100.64.22.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1717756140
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c14e6ee0-24b8-11ef-9f46-91603b00c012
+
+
+
diff --git a/graph/incidents_graphml/c/c1572f10-3e56-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/c/c1572f10-3e56-11ee-9b4e-c562a9c40af9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f989421ce660fb5b4c34f328e4967e6d4255fff3
--- /dev/null
+++ b/graph/incidents_graphml/c/c1572f10-3e56-11ee-9b4e-c562a9c40af9.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.190
+ 100.64.27.190
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.58.41
+ 100.64.58.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.10.103
+ 100.64.10.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.134
+ 100.64.69.134
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.135
+ 100.64.69.135
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.136
+ 100.64.69.136
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425282
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1572f10-3e56-11ee-9b4e-c562a9c40af9
+
+
+
diff --git a/graph/incidents_graphml/c/c1591990-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c1591990-789b-11ee-8d62-1fa49ad9521f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45cdcacd17a180b39525d2dbead5b79642da86a9
--- /dev/null
+++ b/graph/incidents_graphml/c/c1591990-789b-11ee-8d62-1fa49ad9521f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.142
+ 100.64.30.142
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698832085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c1591990-789b-11ee-8d62-1fa49ad9521f
+
+
+
diff --git a/graph/incidents_graphml/c/c1598180-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/c/c1598180-0010-11ef-83c1-e54678fd0000.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3c9a4d6e7ca0b6f2da727a702d5801b70dab12a
--- /dev/null
+++ b/graph/incidents_graphml/c/c1598180-0010-11ef-83c1-e54678fd0000.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.184
+ 100.64.51.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1713725743
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1598180-0010-11ef-83c1-e54678fd0000
+
+
+
diff --git a/graph/incidents_graphml/c/c15dc740-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/c/c15dc740-0010-11ef-83c1-e54678fd0000.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0f6b2adff359e035949ac59f0da80e0b8d899bf
--- /dev/null
+++ b/graph/incidents_graphml/c/c15dc740-0010-11ef-83c1-e54678fd0000.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.51.184
+ 100.64.51.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713725743
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c15dc740-0010-11ef-83c1-e54678fd0000
+
+
+
diff --git a/graph/incidents_graphml/c/c1665a30-1007-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/c/c1665a30-1007-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d059dd4641e380ffa4a14230a9a0b7adb6ce67f1
--- /dev/null
+++ b/graph/incidents_graphml/c/c1665a30-1007-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.84
+ 100.64.66.84
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687333599
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1665a30-1007-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/c/c16925f0-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c16925f0-fe17-11ed-b81a-6328c43e92e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08cc3fd353262d0d97811d857405d3d0ad7dd4f8
--- /dev/null
+++ b/graph/incidents_graphml/c/c16925f0-fe17-11ed-b81a-6328c43e92e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.119
+ 100.64.27.119
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685361350
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c16925f0-fe17-11ed-b81a-6328c43e92e7
+
+
+
diff --git a/graph/incidents_graphml/c/c16aa5c0-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c16aa5c0-789b-11ee-8d62-1fa49ad9521f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9816da6077284ce928fb4ff4e4e25b0a6f7d014a
--- /dev/null
+++ b/graph/incidents_graphml/c/c16aa5c0-789b-11ee-8d62-1fa49ad9521f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.142
+ 100.64.30.142
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698832085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c16aa5c0-789b-11ee-8d62-1fa49ad9521f
+
+
+
diff --git a/graph/incidents_graphml/c/c17271a0-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c17271a0-24b8-11ef-9f46-91603b00c012.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..140f3fd0efe28db07ab04b6556b94e4adfd7deb9
--- /dev/null
+++ b/graph/incidents_graphml/c/c17271a0-24b8-11ef-9f46-91603b00c012.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.6
+ 100.64.49.6
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717756141
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17271a0-24b8-11ef-9f46-91603b00c012
+
+
+
diff --git a/graph/incidents_graphml/c/c174ca40-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c174ca40-8454-11ee-ad04-df7d06c31c2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43b9d01c28875ec729353420a7d96c485a30cb45
--- /dev/null
+++ b/graph/incidents_graphml/c/c174ca40-8454-11ee-ad04-df7d06c31c2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.208
+ 100.64.10.208
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700121005
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c174ca40-8454-11ee-ad04-df7d06c31c2e
+
+
+
diff --git a/graph/incidents_graphml/c/c1780420-3936-11ef-a411-6df7c82319e6.graphml b/graph/incidents_graphml/c/c1780420-3936-11ef-a411-6df7c82319e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0071845253f6a919ef5e8c32b513fb0ea275011b
--- /dev/null
+++ b/graph/incidents_graphml/c/c1780420-3936-11ef-a411-6df7c82319e6.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.18
+ 100.64.6.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.225
+ 100.64.4.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720009280
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1780420-3936-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009280
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1780420-3936-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009280
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1780420-3936-11ef-a411-6df7c82319e6
+
+
+ INCIDENT_LINK
+ 1720009280
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1780420-3936-11ef-a411-6df7c82319e6
+
+
+
diff --git a/graph/incidents_graphml/c/c17a3f50-032d-11ee-bd4a-8bf288ff3594.graphml b/graph/incidents_graphml/c/c17a3f50-032d-11ee-bd4a-8bf288ff3594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66e375016fedebae78757d933f6fbe0d58b83b7f
--- /dev/null
+++ b/graph/incidents_graphml/c/c17a3f50-032d-11ee-bd4a-8bf288ff3594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.99
+ 100.64.11.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.116
+ 100.64.71.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685920555
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17a3f50-032d-11ee-bd4a-8bf288ff3594
+
+
+
diff --git a/graph/incidents_graphml/c/c17db890-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c17db890-789b-11ee-8d62-1fa49ad9521f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..791dd93ab60034d41b76a2dd395dcab3558b1200
--- /dev/null
+++ b/graph/incidents_graphml/c/c17db890-789b-11ee-8d62-1fa49ad9521f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.142
+ 100.64.30.142
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698832085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c17db890-789b-11ee-8d62-1fa49ad9521f
+
+
+
diff --git a/graph/incidents_graphml/c/c17ea250-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/c/c17ea250-bcf3-11ed-9421-6db30872eff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00c15dbd54a038de73c8be8759f66a554c8e4a9a
--- /dev/null
+++ b/graph/incidents_graphml/c/c17ea250-bcf3-11ed-9421-6db30872eff3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.36
+ 100.64.86.36
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678199062
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c17ea250-bcf3-11ed-9421-6db30872eff3
+
+
+
diff --git a/graph/incidents_graphml/c/c17ec990-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/c17ec990-0da9-11ee-812a-a702327978d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6a77ddf120a42132ff46cc39507c31a953695ee
--- /dev/null
+++ b/graph/incidents_graphml/c/c17ec990-0da9-11ee-812a-a702327978d7.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.106
+ 100.64.25.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.107
+ 100.64.25.107
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.108
+ 100.64.25.108
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.109
+ 100.64.25.109
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.110
+ 100.64.25.110
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.111
+ 100.64.25.111
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687073324
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17ec990-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073324
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17ec990-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073324
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17ec990-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073324
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17ec990-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073324
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17ec990-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073324
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17ec990-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073324
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17ec990-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073324
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17ec990-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073324
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17ec990-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073324
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17ec990-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073324
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17ec990-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073324
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c17ec990-0da9-11ee-812a-a702327978d7
+
+
+
diff --git a/graph/incidents_graphml/c/c181fdb0-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/c/c181fdb0-bcf3-11ed-9421-6db30872eff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4d7a7b37a4edec1d6e869645ce4fff263caec0a
--- /dev/null
+++ b/graph/incidents_graphml/c/c181fdb0-bcf3-11ed-9421-6db30872eff3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.36
+ 100.64.86.36
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678199062
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c181fdb0-bcf3-11ed-9421-6db30872eff3
+
+
+
diff --git a/graph/incidents_graphml/c/c183f160-4ede-11ee-a8d5-451ce28ad892.graphml b/graph/incidents_graphml/c/c183f160-4ede-11ee-a8d5-451ce28ad892.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f545d4e18c90bbdf4a341f8d40271dc8e0f6f05c
--- /dev/null
+++ b/graph/incidents_graphml/c/c183f160-4ede-11ee-a8d5-451ce28ad892.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.142
+ 100.64.20.142
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694242913
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c183f160-4ede-11ee-a8d5-451ce28ad892
+
+
+
diff --git a/graph/incidents_graphml/c/c1855d60-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c1855d60-24b8-11ef-9f46-91603b00c012.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..faec24e17a7e0e3186b9b8382849af5687c9250d
--- /dev/null
+++ b/graph/incidents_graphml/c/c1855d60-24b8-11ef-9f46-91603b00c012.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.6
+ 100.64.49.6
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717756141
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c1855d60-24b8-11ef-9f46-91603b00c012
+
+
+
diff --git a/graph/incidents_graphml/c/c186f2b0-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c186f2b0-8454-11ee-ad04-df7d06c31c2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4cddfbc527a715f10570fa6a500460afc6c8c51
--- /dev/null
+++ b/graph/incidents_graphml/c/c186f2b0-8454-11ee-ad04-df7d06c31c2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.208
+ 100.64.10.208
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700121005
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c186f2b0-8454-11ee-ad04-df7d06c31c2e
+
+
+
diff --git a/graph/incidents_graphml/c/c188b1d0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/c188b1d0-1c3c-11ed-9dc4-eb234c0496d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a32b9c15de881013aa9841915b1555b0f89c73b
--- /dev/null
+++ b/graph/incidents_graphml/c/c188b1d0-1c3c-11ed-9dc4-eb234c0496d2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.40
+ 100.64.78.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.200
+ 100.64.73.200
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660528278
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c188b1d0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+ INCIDENT_LINK
+ 1660528278
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c188b1d0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+
diff --git a/graph/incidents_graphml/c/c18b2040-1007-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/c/c18b2040-1007-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f73be2735d43b5aa6320d2ed3f7b91d91f9983df
--- /dev/null
+++ b/graph/incidents_graphml/c/c18b2040-1007-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.84
+ 100.64.66.84
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687333599
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c18b2040-1007-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/c/c18fc0c0-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c18fc0c0-fe17-11ed-b81a-6328c43e92e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eed045e28b911948ac406f6fcdfa19a5853b78a4
--- /dev/null
+++ b/graph/incidents_graphml/c/c18fc0c0-fe17-11ed-b81a-6328c43e92e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.27.119
+ 100.64.27.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685361350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c18fc0c0-fe17-11ed-b81a-6328c43e92e7
+
+
+
diff --git a/graph/incidents_graphml/c/c190f270-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c190f270-789b-11ee-8d62-1fa49ad9521f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbf7d4c7e93ed3fe8796af59c4aef46e9238051a
--- /dev/null
+++ b/graph/incidents_graphml/c/c190f270-789b-11ee-8d62-1fa49ad9521f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.142
+ 100.64.30.142
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698832085
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c190f270-789b-11ee-8d62-1fa49ad9521f
+
+
+
diff --git a/graph/incidents_graphml/c/c19122b0-032d-11ee-bd4a-8bf288ff3594.graphml b/graph/incidents_graphml/c/c19122b0-032d-11ee-bd4a-8bf288ff3594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ceee19f91c7b51c775308d354a28eecc328e2bd
--- /dev/null
+++ b/graph/incidents_graphml/c/c19122b0-032d-11ee-bd4a-8bf288ff3594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.143
+ 100.64.68.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.87
+ 100.64.71.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685920555
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c19122b0-032d-11ee-bd4a-8bf288ff3594
+
+
+
diff --git a/graph/incidents_graphml/c/c19bba20-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/c/c19bba20-f9fb-11ee-a91e-b385ff48b568.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7e6e89ef6cb4b2b2d61c5737fbfd7fe1fc595e6
--- /dev/null
+++ b/graph/incidents_graphml/c/c19bba20-f9fb-11ee-a91e-b385ff48b568.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.54
+ 100.64.64.54
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713057017
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c19bba20-f9fb-11ee-a91e-b385ff48b568
+
+
+
diff --git a/graph/incidents_graphml/c/c1a0b670-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1a0b670-f298-11ee-947c-f57b4c0de6ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d302fb7c716a7ef54265626f07414b3871d9b02b
--- /dev/null
+++ b/graph/incidents_graphml/c/c1a0b670-f298-11ee-947c-f57b4c0de6ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.41.105.88
+ 10.41.105.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.30.215
+ USER-0015-1958.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1712244839
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c1a0b670-f298-11ee-947c-f57b4c0de6ec
+
+
+
diff --git a/graph/incidents_graphml/c/c1a4a180-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c1a4a180-789b-11ee-8d62-1fa49ad9521f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c7139f930788b8a675e4ebeba6fe60fde0224fc
--- /dev/null
+++ b/graph/incidents_graphml/c/c1a4a180-789b-11ee-8d62-1fa49ad9521f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.142
+ 100.64.30.142
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698832086
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c1a4a180-789b-11ee-8d62-1fa49ad9521f
+
+
+
diff --git a/graph/incidents_graphml/c/c1a56210-3150-11ee-9a81-45e5b946e7a5.graphml b/graph/incidents_graphml/c/c1a56210-3150-11ee-9a81-45e5b946e7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f3b3a6cd1da3f9aab8331b25819f3c6416fd5f4
--- /dev/null
+++ b/graph/incidents_graphml/c/c1a56210-3150-11ee-9a81-45e5b946e7a5.graphml
@@ -0,0 +1,575 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.203
+ 100.64.7.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.183
+ USER-0015-1192.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.153
+ 100.64.6.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.184
+ 100.64.9.184
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.185
+ 100.64.9.185
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.186
+ USER-0015-1193.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.187
+ 100.64.9.187
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.188
+ 100.64.9.188
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.189
+ 100.64.9.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.190
+ 100.64.9.190
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.191
+ 100.64.9.191
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.91
+ 100.64.9.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.149
+ 100.64.9.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.192
+ 100.64.9.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.193
+ 100.64.9.193
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.51
+ 100.64.7.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993341
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1a56210-3150-11ee-9a81-45e5b946e7a5
+
+
+
diff --git a/graph/incidents_graphml/c/c1ab8620-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c1ab8620-fe17-11ed-b81a-6328c43e92e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f396370bd3da3fed7dccf00aa1cef873272a116
--- /dev/null
+++ b/graph/incidents_graphml/c/c1ab8620-fe17-11ed-b81a-6328c43e92e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.24.21
+ 100.64.24.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685361350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c1ab8620-fe17-11ed-b81a-6328c43e92e7
+
+
+
diff --git a/graph/incidents_graphml/c/c1acd910-1007-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/c/c1acd910-1007-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac1179a2f352af6ddd496944f61e806a975d9132
--- /dev/null
+++ b/graph/incidents_graphml/c/c1acd910-1007-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.86
+ 100.64.66.86
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687333599
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1acd910-1007-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/c/c1ad87b0-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1ad87b0-f298-11ee-947c-f57b4c0de6ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7831f33ac43916810a374775ee705c1dd4bb916
--- /dev/null
+++ b/graph/incidents_graphml/c/c1ad87b0-f298-11ee-947c-f57b4c0de6ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.251
+ USER-0015-1959.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.41.105.88
+ 10.41.105.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1712244839
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1ad87b0-f298-11ee-947c-f57b4c0de6ec
+
+
+
diff --git a/graph/incidents_graphml/c/c1afb750-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/c/c1afb750-f9fb-11ee-a91e-b385ff48b568.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32cf68e674a0e505c5d1c35f9e35c9a29e2b13ba
--- /dev/null
+++ b/graph/incidents_graphml/c/c1afb750-f9fb-11ee-a91e-b385ff48b568.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.54
+ 100.64.64.54
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713057017
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c1afb750-f9fb-11ee-a91e-b385ff48b568
+
+
+
diff --git a/graph/incidents_graphml/c/c1b23bb0-1b49-11ee-80b5-4fc6a3f1abdb.graphml b/graph/incidents_graphml/c/c1b23bb0-1b49-11ee-80b5-4fc6a3f1abdb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6647e099521aa47304a9855d3bbf8da967a494a8
--- /dev/null
+++ b/graph/incidents_graphml/c/c1b23bb0-1b49-11ee-80b5-4fc6a3f1abdb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.180
+ 100.64.13.180
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.2.216.92
+ 10.2.216.92
+ []
+ 0.4375
+ ["Precinct"]
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host"]
+ complete-mission
+ Disrupted
+ c1b23bb0-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host"]
+ complete-mission
+ Disrupted
+ c1b23bb0-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+
diff --git a/graph/incidents_graphml/c/c1b3ef20-4a09-11ee-8bf8-c1f4992fd587.graphml b/graph/incidents_graphml/c/c1b3ef20-4a09-11ee-8bf8-c1f4992fd587.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fa242f157f6f9365d303cbf06434266667a9535
--- /dev/null
+++ b/graph/incidents_graphml/c/c1b3ef20-4a09-11ee-8bf8-c1f4992fd587.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.79
+ 100.64.33.79
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693711626
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1b3ef20-4a09-11ee-8bf8-c1f4992fd587
+
+
+
diff --git a/graph/incidents_graphml/c/c1bc54c0-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1bc54c0-f298-11ee-947c-f57b4c0de6ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1171296ec4974f1a27124293edfde54066fd9a23
--- /dev/null
+++ b/graph/incidents_graphml/c/c1bc54c0-f298-11ee-947c-f57b4c0de6ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.41.105.88
+ 10.41.105.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.12.251
+ USER-0015-1959.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1712244839
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c1bc54c0-f298-11ee-947c-f57b4c0de6ec
+
+
+
diff --git a/graph/incidents_graphml/c/c1bcb0e0-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c1bcb0e0-8de5-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..14bcc7a5dbfb9c3fcee85dc9d0b5334f87975a52
--- /dev/null
+++ b/graph/incidents_graphml/c/c1bcb0e0-8de5-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.114
+ 100.64.64.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701172843
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1bcb0e0-8de5-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/c1bd18d0-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c1bd18d0-065b-11ee-8408-0dec377ed8c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9bc85fe2c322692d0c883b9db547e68b3634886f
--- /dev/null
+++ b/graph/incidents_graphml/c/c1bd18d0-065b-11ee-8408-0dec377ed8c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.179
+ 100.64.73.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686270165
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c1bd18d0-065b-11ee-8408-0dec377ed8c7
+
+
+
diff --git a/graph/incidents_graphml/c/c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb.graphml b/graph/incidents_graphml/c/c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..380fe2ae6721445f986d081e733a57c7e714b932
--- /dev/null
+++ b/graph/incidents_graphml/c/c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.123
+ 100.64.8.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.181
+ 100.64.13.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.182
+ 100.64.13.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.183
+ 100.64.13.183
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.184
+ 100.64.13.184
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.185
+ 100.64.13.185
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.186
+ 100.64.13.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+ INCIDENT_LINK
+ 1688571409
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1c4d950-1b49-11ee-80b5-4fc6a3f1abdb
+
+
+
diff --git a/graph/incidents_graphml/c/c1c92600-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1c92600-f298-11ee-947c-f57b4c0de6ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d52cb70fb01c4c4f9ef41564cfe2838115cbf0a8
--- /dev/null
+++ b/graph/incidents_graphml/c/c1c92600-f298-11ee-947c-f57b4c0de6ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.7
+ 100.64.84.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.41.105.88
+ 10.41.105.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1712244839
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1c92600-f298-11ee-947c-f57b4c0de6ec
+
+
+
diff --git a/graph/incidents_graphml/c/c1cd79c0-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c1cd79c0-8de5-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50fcff1d46e3444589580a5028820ee39f28c38e
--- /dev/null
+++ b/graph/incidents_graphml/c/c1cd79c0-8de5-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.180
+ 100.64.35.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701172843
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1cd79c0-8de5-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/c1d279a0-4ea9-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/c/c1d279a0-4ea9-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..873ea7f6379e38e0f517c6a273dd64cd5cec3db9
--- /dev/null
+++ b/graph/incidents_graphml/c/c1d279a0-4ea9-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.150
+ 100.64.41.150
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694220150
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c1d279a0-4ea9-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/c/c1d7f310-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1d7f310-f298-11ee-947c-f57b4c0de6ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81c9e07b9520d34efea400c86c013be8c6f78135
--- /dev/null
+++ b/graph/incidents_graphml/c/c1d7f310-f298-11ee-947c-f57b4c0de6ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.41.105.88
+ 10.41.105.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.7
+ 100.64.84.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1712244839
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c1d7f310-f298-11ee-947c-f57b4c0de6ec
+
+
+
diff --git a/graph/incidents_graphml/c/c1dafa90-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c1dafa90-fe17-11ed-b81a-6328c43e92e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9ffc53dcfdf55133d4a7ea45e8af95b2ab9ae5a
--- /dev/null
+++ b/graph/incidents_graphml/c/c1dafa90-fe17-11ed-b81a-6328c43e92e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.80
+ 100.64.15.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685361350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1dafa90-fe17-11ed-b81a-6328c43e92e7
+
+
+
diff --git a/graph/incidents_graphml/c/c1daff90-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c1daff90-e0ed-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cc0f32462cc1936c8c76d973e00d3bd2ff26479
--- /dev/null
+++ b/graph/incidents_graphml/c/c1daff90-e0ed-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.136
+ 100.64.20.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710302226
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1daff90-e0ed-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/c/c1dcbc00-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c1dcbc00-8de5-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d9ac32b75f6817401204b90a608303393e90535
--- /dev/null
+++ b/graph/incidents_graphml/c/c1dcbc00-8de5-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.180
+ 100.64.35.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701172843
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c1dcbc00-8de5-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/c1e19c10-3ca6-11ee-874c-c948d9dda210.graphml b/graph/incidents_graphml/c/c1e19c10-3ca6-11ee-874c-c948d9dda210.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c3c6530baf25fd7889c7c3d64bb1a214f592378
--- /dev/null
+++ b/graph/incidents_graphml/c/c1e19c10-3ca6-11ee-874c-c948d9dda210.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.232
+ 100.64.47.232
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.233
+ 100.64.47.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.170
+ 100.64.40.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.234
+ 100.64.47.234
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692239741
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1e19c10-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239741
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1e19c10-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239741
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1e19c10-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239741
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1e19c10-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239741
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1e19c10-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239741
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1e19c10-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239741
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1e19c10-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239741
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c1e19c10-3ca6-11ee-874c-c948d9dda210
+
+
+
diff --git a/graph/incidents_graphml/c/c1e1b7d0-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c1e1b7d0-065b-11ee-8408-0dec377ed8c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..afc1fe4dd0cd6525d0d1755a933167e135f78aa3
--- /dev/null
+++ b/graph/incidents_graphml/c/c1e1b7d0-065b-11ee-8408-0dec377ed8c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.226
+ 100.64.73.226
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686270166
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1e1b7d0-065b-11ee-8408-0dec377ed8c7
+
+
+
diff --git a/graph/incidents_graphml/c/c1e40100-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1e40100-f298-11ee-947c-f57b4c0de6ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6cee579995a287637e84618b5a08240926e8f277
--- /dev/null
+++ b/graph/incidents_graphml/c/c1e40100-f298-11ee-947c-f57b4c0de6ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.8
+ USER-0015-1960.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.41.105.88
+ 10.41.105.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1712244839
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1e40100-f298-11ee-947c-f57b4c0de6ec
+
+
+
diff --git a/graph/incidents_graphml/c/c1f08360-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c1f08360-e0ed-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8531c9896d2fcd4a2244e4785a8b35cab5e02aa5
--- /dev/null
+++ b/graph/incidents_graphml/c/c1f08360-e0ed-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.136
+ 100.64.20.136
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710302226
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c1f08360-e0ed-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/c/c1f27ff0-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1f27ff0-f298-11ee-947c-f57b4c0de6ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a58b91d1fa58fde8a18ceabdb49359e2dc7e719
--- /dev/null
+++ b/graph/incidents_graphml/c/c1f27ff0-f298-11ee-947c-f57b4c0de6ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.41.105.88
+ 10.41.105.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.8
+ USER-0015-1960.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1712244839
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c1f27ff0-f298-11ee-947c-f57b4c0de6ec
+
+
+
diff --git a/graph/incidents_graphml/c/c1f6c670-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c1f6c670-065b-11ee-8408-0dec377ed8c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e73acb4ef5d9ff6c0f8b7adfd6034576e02c09eb
--- /dev/null
+++ b/graph/incidents_graphml/c/c1f6c670-065b-11ee-8408-0dec377ed8c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.226
+ 100.64.73.226
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686270166
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c1f6c670-065b-11ee-8408-0dec377ed8c7
+
+
+
diff --git a/graph/incidents_graphml/c/c1fe1c80-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/c/c1fe1c80-6c00-11ee-9973-9b86183b2cfc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4bd21506e5091abad6b770fec072f0aacccea376
--- /dev/null
+++ b/graph/incidents_graphml/c/c1fe1c80-6c00-11ee-9973-9b86183b2cfc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.90.16
+ 100.64.90.16
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1697446100
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1fe1c80-6c00-11ee-9973-9b86183b2cfc
+
+
+
diff --git a/graph/incidents_graphml/c/c1fe4e80-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/c/c1fe4e80-ab6c-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..936a8aa9bd92cdbd5ed888f38f7f9619679ed4c7
--- /dev/null
+++ b/graph/incidents_graphml/c/c1fe4e80-ab6c-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.90
+ 100.64.88.90
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1676271911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1fe4e80-ab6c-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/c/c1feb4f0-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c1feb4f0-f298-11ee-947c-f57b4c0de6ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b25d8dd790009268c413c3e01ed458132ea682af
--- /dev/null
+++ b/graph/incidents_graphml/c/c1feb4f0-f298-11ee-947c-f57b4c0de6ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.234
+ USER-0015-1961.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.41.105.88
+ 10.41.105.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1712244839
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c1feb4f0-f298-11ee-947c-f57b4c0de6ec
+
+
+
diff --git a/graph/incidents_graphml/c/c2030970-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/c/c2030970-ab6c-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8ece6ad08b730b36542ac22c6440ff2c9321c1d
--- /dev/null
+++ b/graph/incidents_graphml/c/c2030970-ab6c-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.90
+ 100.64.88.90
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676271911
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2030970-ab6c-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/c/c2059200-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c2059200-e0ed-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35e20ceaeb037a739ddd3d662994b2ad40ebbb4b
--- /dev/null
+++ b/graph/incidents_graphml/c/c2059200-e0ed-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.165
+ 100.64.12.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710302226
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2059200-e0ed-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/c/c20879d0-13d2-11ef-ac06-779f33eb9435.graphml b/graph/incidents_graphml/c/c20879d0-13d2-11ef-ac06-779f33eb9435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bad06a7e2582ce9ce5d92a8dbe451abfc0b523ab
--- /dev/null
+++ b/graph/incidents_graphml/c/c20879d0-13d2-11ef-ac06-779f33eb9435.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.237.35
+ 172.21.237.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.141.9.45
+ 10.141.9.45
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.119.242
+ 172.22.119.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715898139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c20879d0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c20879d0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c20879d0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c20879d0-13d2-11ef-ac06-779f33eb9435
+
+
+
diff --git a/graph/incidents_graphml/c/c20ae430-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c20ae430-fe17-11ed-b81a-6328c43e92e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd4be58d6e1647ca41e5bd6c7ee14e38550e1041
--- /dev/null
+++ b/graph/incidents_graphml/c/c20ae430-fe17-11ed-b81a-6328c43e92e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.121
+ 100.64.27.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685361351
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c20ae430-fe17-11ed-b81a-6328c43e92e7
+
+
+
diff --git a/graph/incidents_graphml/c/c20bfc20-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c20bfc20-065b-11ee-8408-0dec377ed8c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..97f220d6181cffdd17acaac0d69cd4257accc57f
--- /dev/null
+++ b/graph/incidents_graphml/c/c20bfc20-065b-11ee-8408-0dec377ed8c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.227
+ 100.64.73.227
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686270166
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c20bfc20-065b-11ee-8408-0dec377ed8c7
+
+
+
diff --git a/graph/incidents_graphml/c/c20d33e0-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c20d33e0-f298-11ee-947c-f57b4c0de6ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..178de60923dcb767e481676b9f21be775235d994
--- /dev/null
+++ b/graph/incidents_graphml/c/c20d33e0-f298-11ee-947c-f57b4c0de6ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.41.105.88
+ 10.41.105.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.29.234
+ USER-0015-1961.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1712244840
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c20d33e0-f298-11ee-947c-f57b4c0de6ec
+
+
+
diff --git a/graph/incidents_graphml/c/c20d85d0-6c00-11ee-9973-9b86183b2cfc.graphml b/graph/incidents_graphml/c/c20d85d0-6c00-11ee-9973-9b86183b2cfc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd5311583ad9afd5e261cd38ea2518d0e94e6f6f
--- /dev/null
+++ b/graph/incidents_graphml/c/c20d85d0-6c00-11ee-9973-9b86183b2cfc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.90.16
+ 100.64.90.16
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697446100
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c20d85d0-6c00-11ee-9973-9b86183b2cfc
+
+
+
diff --git a/graph/incidents_graphml/c/c2137210-032d-11ee-bd4a-8bf288ff3594.graphml b/graph/incidents_graphml/c/c2137210-032d-11ee-bd4a-8bf288ff3594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03a6a58fb7a05fa6f723c5d534ca68d2bc829f34
--- /dev/null
+++ b/graph/incidents_graphml/c/c2137210-032d-11ee-bd4a-8bf288ff3594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.85
+ 100.64.71.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.4.90
+ 100.64.4.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685920556
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2137210-032d-11ee-bd4a-8bf288ff3594
+
+
+
diff --git a/graph/incidents_graphml/c/c219b700-f298-11ee-947c-f57b4c0de6ec.graphml b/graph/incidents_graphml/c/c219b700-f298-11ee-947c-f57b4c0de6ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa6ca4625ae71631fe72574d114ecd2028127fa1
--- /dev/null
+++ b/graph/incidents_graphml/c/c219b700-f298-11ee-947c-f57b4c0de6ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.71
+ USER-0015-1962.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.41.105.88
+ 10.41.105.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1712244840
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c219b700-f298-11ee-947c-f57b4c0de6ec
+
+
+
diff --git a/graph/incidents_graphml/c/c21e9840-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c21e9840-e0ed-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b744a801dc0858df117402efec692fb34d057908
--- /dev/null
+++ b/graph/incidents_graphml/c/c21e9840-e0ed-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.165
+ 100.64.12.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710302226
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c21e9840-e0ed-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/c/c2206e80-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c2206e80-065b-11ee-8408-0dec377ed8c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2cd0c5595e371f33f02ffcb050fd5ada63f68851
--- /dev/null
+++ b/graph/incidents_graphml/c/c2206e80-065b-11ee-8408-0dec377ed8c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.227
+ 100.64.73.227
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686270166
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2206e80-065b-11ee-8408-0dec377ed8c7
+
+
+
diff --git a/graph/incidents_graphml/c/c225bf30-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c225bf30-fe17-11ed-b81a-6328c43e92e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32eaf674be5d04ab16cc3d2723b5f108b65f009e
--- /dev/null
+++ b/graph/incidents_graphml/c/c225bf30-fe17-11ed-b81a-6328c43e92e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.27.121
+ 100.64.27.121
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685361351
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c225bf30-fe17-11ed-b81a-6328c43e92e7
+
+
+
diff --git a/graph/incidents_graphml/c/c22af480-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c22af480-0cab-11ee-8985-55bb832fcc7f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87ee0813cd7f6c007eef57da2bcac25342ae3586
--- /dev/null
+++ b/graph/incidents_graphml/c/c22af480-0cab-11ee-8985-55bb832fcc7f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.157
+ 100.64.1.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.83.48
+ 100.64.83.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686964233
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c22af480-0cab-11ee-8985-55bb832fcc7f
+
+
+ INCIDENT_LINK
+ 1686964233
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c22af480-0cab-11ee-8985-55bb832fcc7f
+
+
+
diff --git a/graph/incidents_graphml/c/c23358c0-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c23358c0-e0ed-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fa5c8f3579dc475c2cdf766bf6a636706f2e2b3
--- /dev/null
+++ b/graph/incidents_graphml/c/c23358c0-e0ed-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.100
+ 100.64.22.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710302226
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c23358c0-e0ed-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/c/c2357d20-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c2357d20-065b-11ee-8408-0dec377ed8c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff9e3471308091d13d9d11bad04d0d371a9d087b
--- /dev/null
+++ b/graph/incidents_graphml/c/c2357d20-065b-11ee-8408-0dec377ed8c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.228
+ 100.64.73.228
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686270166
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2357d20-065b-11ee-8408-0dec377ed8c7
+
+
+
diff --git a/graph/incidents_graphml/c/c2364120-00b9-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/c/c2364120-00b9-11ef-8b56-b9c5ad676a8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb48762dccbe0cc35463152ea05fc2ef51b1c838
--- /dev/null
+++ b/graph/incidents_graphml/c/c2364120-00b9-11ef-8b56-b9c5ad676a8a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.70
+ 100.64.13.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.31.158
+ 100.64.31.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713798329
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2364120-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798329
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2364120-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798329
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2364120-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798329
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2364120-00b9-11ef-8b56-b9c5ad676a8a
+
+
+
diff --git a/graph/incidents_graphml/c/c242bd10-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c242bd10-fe17-11ed-b81a-6328c43e92e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16f5c0ee8770a2ce4f7cfe5265d5b678c6c1b9eb
--- /dev/null
+++ b/graph/incidents_graphml/c/c242bd10-fe17-11ed-b81a-6328c43e92e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.61
+ 100.64.12.61
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685361351
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c242bd10-fe17-11ed-b81a-6328c43e92e7
+
+
+
diff --git a/graph/incidents_graphml/c/c2492c30-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c2492c30-065b-11ee-8408-0dec377ed8c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3c73aaa2600a7018a68ecd70ed09779d6f2e2b5
--- /dev/null
+++ b/graph/incidents_graphml/c/c2492c30-065b-11ee-8408-0dec377ed8c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.228
+ 100.64.73.228
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686270166
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c2492c30-065b-11ee-8408-0dec377ed8c7
+
+
+
diff --git a/graph/incidents_graphml/c/c24e0cb0-e0ed-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/c/c24e0cb0-e0ed-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..161c3b11491c0cff5d86bdc946f6d0349b1fe55d
--- /dev/null
+++ b/graph/incidents_graphml/c/c24e0cb0-e0ed-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.100
+ 100.64.22.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710302226
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c24e0cb0-e0ed-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/c/c25cbb70-056f-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/c/c25cbb70-056f-11ee-bce7-dffdb32a6ba9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c1daa9786dc8ae3f2750b62ef6f578a4f4331f5
--- /dev/null
+++ b/graph/incidents_graphml/c/c25cbb70-056f-11ee-bce7-dffdb32a6ba9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.137
+ 100.64.72.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.59.179
+ 100.64.59.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1686168805
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c25cbb70-056f-11ee-bce7-dffdb32a6ba9
+
+
+ INCIDENT_LINK
+ 1686168805
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c25cbb70-056f-11ee-bce7-dffdb32a6ba9
+
+
+
diff --git a/graph/incidents_graphml/c/c25fe200-fe17-11ed-b81a-6328c43e92e7.graphml b/graph/incidents_graphml/c/c25fe200-fe17-11ed-b81a-6328c43e92e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..212588f57633e1f996443d71f756afff3df08a9b
--- /dev/null
+++ b/graph/incidents_graphml/c/c25fe200-fe17-11ed-b81a-6328c43e92e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.61
+ 100.64.12.61
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685361351
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c25fe200-fe17-11ed-b81a-6328c43e92e7
+
+
+
diff --git a/graph/incidents_graphml/c/c261d3c0-1c3c-11ed-9dc4-eb234c0496d2.graphml b/graph/incidents_graphml/c/c261d3c0-1c3c-11ed-9dc4-eb234c0496d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..009f6ec47ec99d13345d62704a32d9aa7f3dbdd7
--- /dev/null
+++ b/graph/incidents_graphml/c/c261d3c0-1c3c-11ed-9dc4-eb234c0496d2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.41
+ 100.64.78.41
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.234
+ 100.64.70.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660528280
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c261d3c0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+ INCIDENT_LINK
+ 1660528280
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c261d3c0-1c3c-11ed-9dc4-eb234c0496d2
+
+
+
diff --git a/graph/incidents_graphml/c/c26747c0-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c26747c0-6bc2-11ee-ac23-0990c4be3eac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abbc1d8960ffdd625c0af4eaf3bd19a3379e2fcd
--- /dev/null
+++ b/graph/incidents_graphml/c/c26747c0-6bc2-11ee-ac23-0990c4be3eac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.123
+ 100.64.62.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697419472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c26747c0-6bc2-11ee-ac23-0990c4be3eac
+
+
+
diff --git a/graph/incidents_graphml/c/c2687f80-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/c/c2687f80-182c-11ee-b591-f5bec484f8bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0170e1b75f7d4d1fa4878ecf0e12608e97831d41
--- /dev/null
+++ b/graph/incidents_graphml/c/c2687f80-182c-11ee-b591-f5bec484f8bc.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.154
+ 100.64.11.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.75
+ 100.64.73.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.76
+ 100.64.73.76
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.77
+ 100.64.73.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.78
+ 100.64.73.78
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.79
+ USER-0015-1651.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688229101
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2687f80-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229101
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2687f80-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229101
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2687f80-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229101
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2687f80-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229101
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2687f80-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229101
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2687f80-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229101
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2687f80-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229101
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2687f80-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229101
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2687f80-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229101
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2687f80-182c-11ee-b591-f5bec484f8bc
+
+
+
diff --git a/graph/incidents_graphml/c/c2688f40-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c2688f40-facf-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e7014c7bb146c5d653036b9714c328b212d7bd0
--- /dev/null
+++ b/graph/incidents_graphml/c/c2688f40-facf-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.29.252
+ 100.64.29.252
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685000574
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2688f40-facf-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/c/c269f800-e280-11ee-bdbd-61ca27aa8970.graphml b/graph/incidents_graphml/c/c269f800-e280-11ee-bdbd-61ca27aa8970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d7a1604d52c516ce24ce825af95b35bdfd08a7f
--- /dev/null
+++ b/graph/incidents_graphml/c/c269f800-e280-11ee-bdbd-61ca27aa8970.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.242
+ 100.64.61.242
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.243
+ 100.64.61.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.142
+ 100.64.60.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.237
+ 100.64.56.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.248
+ 100.64.19.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.244
+ 100.64.61.244
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710475314
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c269f800-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475314
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c269f800-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475314
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c269f800-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475314
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c269f800-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475314
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c269f800-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475314
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c269f800-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475314
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c269f800-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475314
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c269f800-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475314
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c269f800-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475314
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c269f800-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475314
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c269f800-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475314
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c269f800-e280-11ee-bdbd-61ca27aa8970
+
+
+
diff --git a/graph/incidents_graphml/c/c26dc740-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/c/c26dc740-0d16-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e2b2c9163d0976e068d1acb5b755d5ff7a3353a
--- /dev/null
+++ b/graph/incidents_graphml/c/c26dc740-0d16-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.198
+ 100.64.82.198
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687010189
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c26dc740-0d16-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/c/c2732f40-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2732f40-57e5-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f495f61a7e5bd18bee89e7df9dee49ad77caef8f
--- /dev/null
+++ b/graph/incidents_graphml/c/c2732f40-57e5-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.67
+ 100.64.44.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695235481
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2732f40-57e5-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/c/c274bd10-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/c/c274bd10-a0fb-11ee-b868-0b39d8f52622.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce841cd6eedc9450fa83cec2da9e16b389bcd3db
--- /dev/null
+++ b/graph/incidents_graphml/c/c274bd10-a0fb-11ee-b868-0b39d8f52622.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.188
+ 100.64.14.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703271365
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c274bd10-a0fb-11ee-b868-0b39d8f52622
+
+
+
diff --git a/graph/incidents_graphml/c/c276b110-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c276b110-6bc2-11ee-ac23-0990c4be3eac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5286b069258e77f78fd3882f2bae4cfb90d24ab
--- /dev/null
+++ b/graph/incidents_graphml/c/c276b110-6bc2-11ee-ac23-0990c4be3eac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.123
+ 100.64.62.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697419472
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c276b110-6bc2-11ee-ac23-0990c4be3eac
+
+
+
diff --git a/graph/incidents_graphml/c/c2837220-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/c/c2837220-0d16-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ba23e919c5e57d6dae1d8436667da9a5ba7c841
--- /dev/null
+++ b/graph/incidents_graphml/c/c2837220-0d16-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.198
+ 100.64.82.198
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687010190
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2837220-0d16-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/c/c2846d50-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2846d50-57e5-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a2767b5249f2c1eaff66040da9741f3f39ca92c
--- /dev/null
+++ b/graph/incidents_graphml/c/c2846d50-57e5-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.67
+ 100.64.44.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695235481
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2846d50-57e5-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/c/c286b6a0-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c286b6a0-6bc2-11ee-ac23-0990c4be3eac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3f001d7e118eea0550d47adc371c2fa3087e182
--- /dev/null
+++ b/graph/incidents_graphml/c/c286b6a0-6bc2-11ee-ac23-0990c4be3eac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.125
+ 100.64.62.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697419472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c286b6a0-6bc2-11ee-ac23-0990c4be3eac
+
+
+
diff --git a/graph/incidents_graphml/c/c288cd60-13d2-11ef-ac06-779f33eb9435.graphml b/graph/incidents_graphml/c/c288cd60-13d2-11ef-ac06-779f33eb9435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d249db1a21543d833644ada7aeba9dabf5289531
--- /dev/null
+++ b/graph/incidents_graphml/c/c288cd60-13d2-11ef-ac06-779f33eb9435.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.87
+ 100.64.61.87
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.66
+ 100.64.40.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.88
+ 100.64.61.88
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.89
+ USER-0015-1445.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.236
+ 100.64.40.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.187
+ 100.64.37.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.90
+ 100.64.61.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.158
+ 100.64.31.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.91
+ 100.64.61.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.64
+ 100.64.15.64
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.153
+ 100.64.3.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.114
+ 100.64.22.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.54
+ 100.64.15.54
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.106
+ 100.64.20.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.92
+ 100.64.61.92
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.0.70
+ 100.64.0.70
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.0.71
+ 100.64.0.71
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.161
+ 100.64.24.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c288cd60-13d2-11ef-ac06-779f33eb9435
+
+
+
diff --git a/graph/incidents_graphml/c/c28c73e0-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c28c73e0-41fd-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3104a914acc94da6578dd8eea63abdd4e2513d0c
--- /dev/null
+++ b/graph/incidents_graphml/c/c28c73e0-41fd-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.135
+ USER-0015-1475.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692826864
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c28c73e0-41fd-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c2955ca0-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c2955ca0-6bc2-11ee-ac23-0990c4be3eac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4aee39c24e5dfb7301741b0bf2be8058fecfe3f
--- /dev/null
+++ b/graph/incidents_graphml/c/c2955ca0-6bc2-11ee-ac23-0990c4be3eac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.125
+ 100.64.62.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697419472
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2955ca0-6bc2-11ee-ac23-0990c4be3eac
+
+
+
diff --git a/graph/incidents_graphml/c/c297f550-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c297f550-57e5-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a703eda4493aae8bbd3d375cd2b6254dfc1ef489
--- /dev/null
+++ b/graph/incidents_graphml/c/c297f550-57e5-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.69
+ 100.64.44.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695235481
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c297f550-57e5-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/c/c29b09c0-a0fb-11ee-b868-0b39d8f52622.graphml b/graph/incidents_graphml/c/c29b09c0-a0fb-11ee-b868-0b39d8f52622.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e9eac8de03f2ac951500e2bacbc5967e0bb9a7d
--- /dev/null
+++ b/graph/incidents_graphml/c/c29b09c0-a0fb-11ee-b868-0b39d8f52622.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.192
+ 100.64.14.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703271365
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c29b09c0-a0fb-11ee-b868-0b39d8f52622
+
+
+
diff --git a/graph/incidents_graphml/c/c29c2b50-41fd-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c29c2b50-41fd-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..28378f01ee91982d769d7e36a11904db58dc4677
--- /dev/null
+++ b/graph/incidents_graphml/c/c29c2b50-41fd-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.135
+ USER-0015-1475.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692826864
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c29c2b50-41fd-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c29f4b30-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/c29f4b30-2607-11ee-ad88-fb76ca0617eb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15ffcc6ef6aa40e745678f54ebdf3aba30dd7b2c
--- /dev/null
+++ b/graph/incidents_graphml/c/c29f4b30-2607-11ee-ad88-fb76ca0617eb.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.174
+ 100.64.61.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689752526
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c29f4b30-2607-11ee-ad88-fb76ca0617eb
+
+
+ INCIDENT_LINK
+ 1689752526
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c29f4b30-2607-11ee-ad88-fb76ca0617eb
+
+
+
diff --git a/graph/incidents_graphml/c/c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/c/c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c601428ad870402b3cd9a1b9beee3e5119693a4
--- /dev/null
+++ b/graph/incidents_graphml/c/c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.199.11.73
+ 10.199.11.73
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","PAN NGFW","Windows Active Directory"]
+
+
+ HOST
+ 100.64.70.170
+ 100.64.70.170
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.171
+ 100.64.70.171
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.172
+ 100.64.70.172
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.173
+ 100.64.70.173
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.174
+ 100.64.70.174
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.166
+ 100.64.70.166
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.175
+ 100.64.70.175
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.176
+ 100.64.70.176
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.125
+ 100.64.70.125
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.177
+ 100.64.70.177
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713798330
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a0e9d0-00b9-11ef-8b56-b9c5ad676a8a
+
+
+
diff --git a/graph/incidents_graphml/c/c2a1b8b0-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c2a1b8b0-6bc2-11ee-ac23-0990c4be3eac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..126800a052892c5499feab283604fe6190ed3abb
--- /dev/null
+++ b/graph/incidents_graphml/c/c2a1b8b0-6bc2-11ee-ac23-0990c4be3eac.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.211
+ 100.64.33.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697419472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2a1b8b0-6bc2-11ee-ac23-0990c4be3eac
+
+
+ INCIDENT_LINK
+ 1697419472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2a1b8b0-6bc2-11ee-ac23-0990c4be3eac
+
+
+ INCIDENT_LINK
+ 1697419472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2a1b8b0-6bc2-11ee-ac23-0990c4be3eac
+
+
+
diff --git a/graph/incidents_graphml/c/c2a91ab0-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c2a91ab0-facf-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d137e25fffb6e9b71d488f7635804b59dcd540d
--- /dev/null
+++ b/graph/incidents_graphml/c/c2a91ab0-facf-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.254
+ 100.64.29.254
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685000575
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2a91ab0-facf-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/c/c2aa92f0-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2aa92f0-57e5-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b799da04fbf4f7cd9acf3689f4e830b72d03163e
--- /dev/null
+++ b/graph/incidents_graphml/c/c2aa92f0-57e5-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.69
+ 100.64.44.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695235482
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2aa92f0-57e5-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/c/c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf.graphml b/graph/incidents_graphml/c/c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60a406d946cadb676568b96f3cbe2a5ead435d7d
--- /dev/null
+++ b/graph/incidents_graphml/c/c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.151
+ 100.64.94.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.149
+ 100.64.58.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.101
+ 100.64.44.101
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.15.55
+ 100.64.15.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.13.218
+ 100.64.13.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714983312
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983312
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983312
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983312
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983312
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983312
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983312
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983312
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983312
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983312
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2aafd40-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+
diff --git a/graph/incidents_graphml/c/c2ae08a0-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c2ae08a0-41dc-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..75e763db4c17ef3ca082b8592ad4ff13356b8fae
--- /dev/null
+++ b/graph/incidents_graphml/c/c2ae08a0-41dc-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,755 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.217
+ 100.64.19.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.226
+ 100.64.67.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.227
+ 100.64.67.227
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.228
+ 100.64.67.228
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.130
+ 100.64.11.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.80
+ 100.64.8.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.229
+ 100.64.67.229
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.246
+ 100.64.28.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.230
+ 100.64.67.230
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.70
+ 100.64.33.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.231
+ 100.64.67.231
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.224
+ 100.64.67.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.221
+ 100.64.53.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.232
+ 100.64.67.232
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.48
+ 100.64.14.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.27
+ 100.64.51.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.233
+ 100.64.67.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.234
+ 100.64.67.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.79
+ 100.64.47.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1692812691
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2ae08a0-41dc-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c2b0d3e0-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c2b0d3e0-6bc2-11ee-ac23-0990c4be3eac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a43d3e9e2aa6febb524d98a0af873ae645f99cd7
--- /dev/null
+++ b/graph/incidents_graphml/c/c2b0d3e0-6bc2-11ee-ac23-0990c4be3eac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.211
+ 100.64.33.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697419472
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2b0d3e0-6bc2-11ee-ac23-0990c4be3eac
+
+
+
diff --git a/graph/incidents_graphml/c/c2b82a60-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/c2b82a60-2607-11ee-ad88-fb76ca0617eb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5badd6cef3ea7b7bf83d781ab7f4084b6f63ac02
--- /dev/null
+++ b/graph/incidents_graphml/c/c2b82a60-2607-11ee-ad88-fb76ca0617eb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.174
+ 100.64.61.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689752526
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c2b82a60-2607-11ee-ad88-fb76ca0617eb
+
+
+
diff --git a/graph/incidents_graphml/c/c2bb82e0-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2bb82e0-57e5-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5814280bf7cc2777655c8138e0fecedcd8f47985
--- /dev/null
+++ b/graph/incidents_graphml/c/c2bb82e0-57e5-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695235482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2bb82e0-57e5-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/c/c2bdb420-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c2bdb420-facf-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9bda239209e7169a391e850ced39ff75fc5b7ad
--- /dev/null
+++ b/graph/incidents_graphml/c/c2bdb420-facf-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.29.254
+ 100.64.29.254
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685000575
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2bdb420-facf-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/c/c2c40180-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c2c40180-065b-11ee-8408-0dec377ed8c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..28bd1d9ef697359191c98ab353955c1a9df21748
--- /dev/null
+++ b/graph/incidents_graphml/c/c2c40180-065b-11ee-8408-0dec377ed8c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.254
+ 100.64.72.254
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686270167
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2c40180-065b-11ee-8408-0dec377ed8c7
+
+
+
diff --git a/graph/incidents_graphml/c/c2c5ce30-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/c/c2c5ce30-1fe1-11ee-80ac-1985e110d782.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15e84e6d7b2f4a8b215d3bcaa6ccd626af300ac8
--- /dev/null
+++ b/graph/incidents_graphml/c/c2c5ce30-1fe1-11ee-80ac-1985e110d782.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.44
+ 100.64.57.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689076499
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2c5ce30-1fe1-11ee-80ac-1985e110d782
+
+
+
diff --git a/graph/incidents_graphml/c/c2caec30-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2caec30-57e5-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd849ed9984e1eff9d7006b118af4f807a43c1e4
--- /dev/null
+++ b/graph/incidents_graphml/c/c2caec30-57e5-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695235482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c2caec30-57e5-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/c/c2cc42e0-3e56-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/c/c2cc42e0-3e56-11ee-9b4e-c562a9c40af9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1cebe79d5d19c78d8787787d1a3de66ad6eee8e7
--- /dev/null
+++ b/graph/incidents_graphml/c/c2cc42e0-3e56-11ee-9b4e-c562a9c40af9.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.137
+ 100.64.69.137
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.10.116
+ 100.64.10.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692425285
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2cc42e0-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425285
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2cc42e0-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425285
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2cc42e0-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425285
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c2cc42e0-3e56-11ee-9b4e-c562a9c40af9
+
+
+
diff --git a/graph/incidents_graphml/c/c2d0d6d0-1411-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/c/c2d0d6d0-1411-11ee-918c-e193118b03e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17a3941ed515d099accdb6b6582d34938a8eb709
--- /dev/null
+++ b/graph/incidents_graphml/c/c2d0d6d0-1411-11ee-918c-e193118b03e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.78
+ 100.64.65.78
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687777701
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2d0d6d0-1411-11ee-918c-e193118b03e7
+
+
+
diff --git a/graph/incidents_graphml/c/c2db8e00-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2db8e00-57e5-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5470ab2e0102e07784ca5d3435674a378ad607d6
--- /dev/null
+++ b/graph/incidents_graphml/c/c2db8e00-57e5-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.71
+ 100.64.44.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695235482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2db8e00-57e5-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/c/c2de3ef0-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c2de3ef0-0cab-11ee-8985-55bb832fcc7f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ccc4bd2f9874a44a8d6d719c08ca1b2c6c3dd55
--- /dev/null
+++ b/graph/incidents_graphml/c/c2de3ef0-0cab-11ee-8985-55bb832fcc7f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.33
+ USER-0015-1830.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686964234
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2de3ef0-0cab-11ee-8985-55bb832fcc7f
+
+
+
diff --git a/graph/incidents_graphml/c/c2e0ff60-065b-11ee-8408-0dec377ed8c7.graphml b/graph/incidents_graphml/c/c2e0ff60-065b-11ee-8408-0dec377ed8c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ace9900af4c7284433c0698c50cfcc256942328
--- /dev/null
+++ b/graph/incidents_graphml/c/c2e0ff60-065b-11ee-8408-0dec377ed8c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.254
+ 100.64.72.254
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686270167
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2e0ff60-065b-11ee-8408-0dec377ed8c7
+
+
+
diff --git a/graph/incidents_graphml/c/c2e19820-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/c/c2e19820-be7c-11ed-9564-3d773f19984f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..871c32164ccd8ae3016fecae22ad33f29d57a2c7
--- /dev/null
+++ b/graph/incidents_graphml/c/c2e19820-be7c-11ed-9564-3d773f19984f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.1
+ 100.64.97.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678367857
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2e19820-be7c-11ed-9564-3d773f19984f
+
+
+
diff --git a/graph/incidents_graphml/c/c2e23cf0-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c2e23cf0-8454-11ee-ad04-df7d06c31c2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9a5b4a7621d754f2e0c9f1f8499964fcbb9422a
--- /dev/null
+++ b/graph/incidents_graphml/c/c2e23cf0-8454-11ee-ad04-df7d06c31c2e.graphml
@@ -0,0 +1,129 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.173
+ 100.64.33.173
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700121007
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2e23cf0-8454-11ee-ad04-df7d06c31c2e
+
+
+ INCIDENT_LINK
+ 1700121007
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2e23cf0-8454-11ee-ad04-df7d06c31c2e
+
+
+ INCIDENT_LINK
+ 1700121007
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2e23cf0-8454-11ee-ad04-df7d06c31c2e
+
+
+ INCIDENT_LINK
+ 1700121007
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2e23cf0-8454-11ee-ad04-df7d06c31c2e
+
+
+
diff --git a/graph/incidents_graphml/c/c2e56420-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/c/c2e56420-1fe1-11ee-80ac-1985e110d782.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..007b1c14a81a481cc7df27b5111f073ab09ba47d
--- /dev/null
+++ b/graph/incidents_graphml/c/c2e56420-1fe1-11ee-80ac-1985e110d782.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.44
+ 100.64.57.44
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689076499
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2e56420-1fe1-11ee-80ac-1985e110d782
+
+
+
diff --git a/graph/incidents_graphml/c/c2e7b2a0-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/c/c2e7b2a0-be7c-11ed-9564-3d773f19984f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d323ea750fc4bbb7b52a8765bf17af9d39b09e8
--- /dev/null
+++ b/graph/incidents_graphml/c/c2e7b2a0-be7c-11ed-9564-3d773f19984f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678367857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2e7b2a0-be7c-11ed-9564-3d773f19984f
+
+
+
diff --git a/graph/incidents_graphml/c/c2e8d470-57e5-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/c/c2e8d470-57e5-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f48c9343f1c15713957377413a3976a9e0e078f0
--- /dev/null
+++ b/graph/incidents_graphml/c/c2e8d470-57e5-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.71
+ 100.64.44.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695235482
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2e8d470-57e5-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/c/c2ec8e80-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c2ec8e80-24b8-11ef-9f46-91603b00c012.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f07482c9f8a3a64c2cbd55c0c1316601fbc610d
--- /dev/null
+++ b/graph/incidents_graphml/c/c2ec8e80-24b8-11ef-9f46-91603b00c012.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.8
+ 100.64.49.8
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717756143
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2ec8e80-24b8-11ef-9f46-91603b00c012
+
+
+
diff --git a/graph/incidents_graphml/c/c2f35ae0-f9fb-11ee-a91e-b385ff48b568.graphml b/graph/incidents_graphml/c/c2f35ae0-f9fb-11ee-a91e-b385ff48b568.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d75378307bb9a47b6d9194fa11e215f2da9c3ad4
--- /dev/null
+++ b/graph/incidents_graphml/c/c2f35ae0-f9fb-11ee-a91e-b385ff48b568.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.56
+ 100.64.64.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713057019
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c2f35ae0-f9fb-11ee-a91e-b385ff48b568
+
+
+
diff --git a/graph/incidents_graphml/c/c2fcc9d0-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c2fcc9d0-8454-11ee-ad04-df7d06c31c2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8f31e16176e7055eba998d8bd4ae813928a348e
--- /dev/null
+++ b/graph/incidents_graphml/c/c2fcc9d0-8454-11ee-ad04-df7d06c31c2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.173
+ 100.64.33.173
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700121007
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c2fcc9d0-8454-11ee-ad04-df7d06c31c2e
+
+
+
diff --git a/graph/incidents_graphml/c/c3017e60-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c3017e60-0cab-11ee-8985-55bb832fcc7f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6222844358c0cb360c707892a5c755d7e502dfa
--- /dev/null
+++ b/graph/incidents_graphml/c/c3017e60-0cab-11ee-8985-55bb832fcc7f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.33
+ USER-0015-1830.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686964234
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3017e60-0cab-11ee-8985-55bb832fcc7f
+
+
+
diff --git a/graph/incidents_graphml/c/c301c5c0-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/c/c301c5c0-1fe1-11ee-80ac-1985e110d782.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5166751236aeea143eb73dfba6c25c8d6c8621db
--- /dev/null
+++ b/graph/incidents_graphml/c/c301c5c0-1fe1-11ee-80ac-1985e110d782.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.46
+ 100.64.57.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689076499
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c301c5c0-1fe1-11ee-80ac-1985e110d782
+
+
+
diff --git a/graph/incidents_graphml/c/c30b9980-83e9-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/c/c30b9980-83e9-11ee-9ada-6590fb922310.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30b287e1d6e1c646e52c5682ef6cf144012c083d
--- /dev/null
+++ b/graph/incidents_graphml/c/c30b9980-83e9-11ee-9ada-6590fb922310.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.170
+ 100.64.17.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700075051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c30b9980-83e9-11ee-9ada-6590fb922310
+
+
+ INCIDENT_LINK
+ 1700075051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c30b9980-83e9-11ee-9ada-6590fb922310
+
+
+
diff --git a/graph/incidents_graphml/c/c31248b0-13d2-11ef-ac06-779f33eb9435.graphml b/graph/incidents_graphml/c/c31248b0-13d2-11ef-ac06-779f33eb9435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4582d1aa04ea2e0bae32ba123cb61b920a4f27c
--- /dev/null
+++ b/graph/incidents_graphml/c/c31248b0-13d2-11ef-ac06-779f33eb9435.graphml
@@ -0,0 +1,797 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.98
+ 100.64.61.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.99
+ 100.64.61.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.100
+ 100.64.61.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.101
+ 100.64.61.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.33
+ 100.64.42.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.247
+ 100.64.23.247
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.185
+ 100.64.15.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.102
+ 100.64.61.102
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.103
+ 100.64.61.103
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.104
+ 100.64.61.104
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.105
+ 100.64.61.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.106
+ 100.64.61.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.107
+ 100.64.61.107
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.93
+ 100.64.10.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.248
+ 100.64.19.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.10.11
+ 100.64.10.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.199
+ 100.64.48.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.251
+ 100.64.14.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31248b0-13d2-11ef-ac06-779f33eb9435
+
+
+
diff --git a/graph/incidents_graphml/c/c314e5b0-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c314e5b0-8454-11ee-ad04-df7d06c31c2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7b71681bfd0a72eaf875cb1407a70e3f372329f
--- /dev/null
+++ b/graph/incidents_graphml/c/c314e5b0-8454-11ee-ad04-df7d06c31c2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.175
+ 100.64.33.175
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700121008
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c314e5b0-8454-11ee-ad04-df7d06c31c2e
+
+
+
diff --git a/graph/incidents_graphml/c/c31de9d0-925f-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/c/c31de9d0-925f-11ee-ac87-cff3005068fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56bbf50f1a7e61ce107cf4a29476e8df9d98af73
--- /dev/null
+++ b/graph/incidents_graphml/c/c31de9d0-925f-11ee-ac87-cff3005068fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.184
+ 100.64.66.184
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701665048
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c31de9d0-925f-11ee-ac87-cff3005068fb
+
+
+
diff --git a/graph/incidents_graphml/c/c31e1cc0-7135-11ee-bce1-87535eed5229.graphml b/graph/incidents_graphml/c/c31e1cc0-7135-11ee-bce1-87535eed5229.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9ffd0563e9f5717456e6ad30a424ae67f1e8597
--- /dev/null
+++ b/graph/incidents_graphml/c/c31e1cc0-7135-11ee-bce1-87535eed5229.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.107
+ 100.64.31.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698018621
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c31e1cc0-7135-11ee-bce1-87535eed5229
+
+
+
diff --git a/graph/incidents_graphml/c/c320f640-83e9-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/c/c320f640-83e9-11ee-9ada-6590fb922310.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9aebe9b4e0475f08c3d74b9432c15ded16b9ec4
--- /dev/null
+++ b/graph/incidents_graphml/c/c320f640-83e9-11ee-9ada-6590fb922310.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.172
+ 100.64.17.172
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700075052
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c320f640-83e9-11ee-9ada-6590fb922310
+
+
+
diff --git a/graph/incidents_graphml/c/c322e250-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/c/c322e250-1fe1-11ee-80ac-1985e110d782.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1fc3ac97bd7ce6a24c4c2501d35c66e26a9edff7
--- /dev/null
+++ b/graph/incidents_graphml/c/c322e250-1fe1-11ee-80ac-1985e110d782.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.46
+ 100.64.57.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689076499
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c322e250-1fe1-11ee-80ac-1985e110d782
+
+
+
diff --git a/graph/incidents_graphml/c/c331d010-b6de-11ed-9d21-f346d8153a36.graphml b/graph/incidents_graphml/c/c331d010-b6de-11ed-9d21-f346d8153a36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d0e5182103bd4d5a7fa7567e007ff8bcb590229
--- /dev/null
+++ b/graph/incidents_graphml/c/c331d010-b6de-11ed-9d21-f346d8153a36.graphml
@@ -0,0 +1,201 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.207
+ 100.64.91.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.77.234
+ 100.64.77.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.3
+ 100.64.25.3
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1039.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.78.153
+ 100.64.78.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677530339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c331d010-b6de-11ed-9d21-f346d8153a36
+
+
+ INCIDENT_LINK
+ 1677530339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c331d010-b6de-11ed-9d21-f346d8153a36
+
+
+ INCIDENT_LINK
+ 1677530339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c331d010-b6de-11ed-9d21-f346d8153a36
+
+
+ INCIDENT_LINK
+ 1677530339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c331d010-b6de-11ed-9d21-f346d8153a36
+
+
+ INCIDENT_LINK
+ 1677530339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c331d010-b6de-11ed-9d21-f346d8153a36
+
+
+ INCIDENT_LINK
+ 1677530339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c331d010-b6de-11ed-9d21-f346d8153a36
+
+
+ INCIDENT_LINK
+ 1677530339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c331d010-b6de-11ed-9d21-f346d8153a36
+
+
+ INCIDENT_LINK
+ 1677530339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c331d010-b6de-11ed-9d21-f346d8153a36
+
+
+
diff --git a/graph/incidents_graphml/c/c332bf40-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c332bf40-24b8-11ef-9f46-91603b00c012.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d227589c9cf2051aecd7531afe78db3aa6d7098f
--- /dev/null
+++ b/graph/incidents_graphml/c/c332bf40-24b8-11ef-9f46-91603b00c012.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.10
+ 100.64.49.10
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717756144
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c332bf40-24b8-11ef-9f46-91603b00c012
+
+
+ INCIDENT_LINK
+ 1717756144
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c332bf40-24b8-11ef-9f46-91603b00c012
+
+
+
diff --git a/graph/incidents_graphml/c/c3362bf0-83e9-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/c/c3362bf0-83e9-11ee-9ada-6590fb922310.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a797e3a145bb0861e4b335456c8e86d3e348cf3
--- /dev/null
+++ b/graph/incidents_graphml/c/c3362bf0-83e9-11ee-9ada-6590fb922310.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.174
+ 100.64.17.174
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700075052
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c3362bf0-83e9-11ee-9ada-6590fb922310
+
+
+
diff --git a/graph/incidents_graphml/c/c3395d20-1c97-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/c/c3395d20-1c97-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd261060312f518bf8776bec8e965fff5d5cf4ef
--- /dev/null
+++ b/graph/incidents_graphml/c/c3395d20-1c97-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.124
+ 100.64.5.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.232
+ 100.64.71.232
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688714863
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3395d20-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714863
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3395d20-1c97-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/c/c3475fb0-e280-11ee-bdbd-61ca27aa8970.graphml b/graph/incidents_graphml/c/c3475fb0-e280-11ee-bdbd-61ca27aa8970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..023238f7fdfb8abc8f6c9bcbadfb6f9b078fc061
--- /dev/null
+++ b/graph/incidents_graphml/c/c3475fb0-e280-11ee-bdbd-61ca27aa8970.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.60
+ 100.64.13.60
+ ["Exploiting Host"]
+ 0.88134765625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.248
+ 100.64.61.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.205
+ 100.64.10.205
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.223
+ 100.64.38.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.141
+ 100.64.16.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.104
+ 100.64.54.104
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.249
+ 100.64.61.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.250
+ 100.64.61.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.61
+ 100.64.38.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.233
+ 100.64.8.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.251
+ 100.64.61.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.108
+ USER-0015-1328.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.4
+ 100.64.8.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.88
+ 100.64.59.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.145
+ 100.64.8.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+ INCIDENT_LINK
+ 1710475315
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3475fb0-e280-11ee-bdbd-61ca27aa8970
+
+
+
diff --git a/graph/incidents_graphml/c/c34a96c0-13d2-11ef-ac06-779f33eb9435.graphml b/graph/incidents_graphml/c/c34a96c0-13d2-11ef-ac06-779f33eb9435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa48cbbefadd7dd3cf8754f29ac1feb2353b2c45
--- /dev/null
+++ b/graph/incidents_graphml/c/c34a96c0-13d2-11ef-ac06-779f33eb9435.graphml
@@ -0,0 +1,753 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.147
+ 100.64.50.147
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.1
+ 100.64.15.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.89
+ 100.64.49.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.176
+ 100.64.13.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.117
+ 100.64.61.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.204
+ 100.64.59.204
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.93
+ 100.64.56.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.118
+ 100.64.61.118
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.1
+ 100.64.3.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.236
+ 100.64.38.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.119
+ 100.64.61.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.14
+ 100.64.2.14
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.120
+ 100.64.61.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.121
+ 100.64.61.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.122
+ 100.64.61.122
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.38
+ 100.64.24.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c34a96c0-13d2-11ef-ac06-779f33eb9435
+
+
+
diff --git a/graph/incidents_graphml/c/c34d5d70-83e9-11ee-9ada-6590fb922310.graphml b/graph/incidents_graphml/c/c34d5d70-83e9-11ee-9ada-6590fb922310.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18769cddc24761588b4d4f7eb0c675fc9e313d01
--- /dev/null
+++ b/graph/incidents_graphml/c/c34d5d70-83e9-11ee-9ada-6590fb922310.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.174
+ 100.64.17.174
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700075052
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c34d5d70-83e9-11ee-9ada-6590fb922310
+
+
+
diff --git a/graph/incidents_graphml/c/c34e0f70-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c34e0f70-24b8-11ef-9f46-91603b00c012.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36b84e349019da1776b6c50224a09ac1800a0b37
--- /dev/null
+++ b/graph/incidents_graphml/c/c34e0f70-24b8-11ef-9f46-91603b00c012.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.10
+ 100.64.49.10
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717756144
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c34e0f70-24b8-11ef-9f46-91603b00c012
+
+
+
diff --git a/graph/incidents_graphml/c/c352bc70-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/c/c352bc70-2435-11ee-bc29-cfb067a56058.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a222a78b601466819cec6df329259d83af487fd
--- /dev/null
+++ b/graph/incidents_graphml/c/c352bc70-2435-11ee-bc29-cfb067a56058.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.161
+ 100.64.32.161
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1689552382
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c352bc70-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552382
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c352bc70-2435-11ee-bc29-cfb067a56058
+
+
+
diff --git a/graph/incidents_graphml/c/c356bfd0-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c356bfd0-facf-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f436971b559b39fdb397875b989fc9ab443c22cb
--- /dev/null
+++ b/graph/incidents_graphml/c/c356bfd0-facf-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.1
+ 100.64.30.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685000576
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c356bfd0-facf-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/c/c35aea70-13d2-11ef-ac06-779f33eb9435.graphml b/graph/incidents_graphml/c/c35aea70-13d2-11ef-ac06-779f33eb9435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..677a10589df28b59610ffb3ddad5e67b0b264631
--- /dev/null
+++ b/graph/incidents_graphml/c/c35aea70-13d2-11ef-ac06-779f33eb9435.graphml
@@ -0,0 +1,825 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.129
+ 100.64.61.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.130
+ 100.64.61.130
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.148
+ 100.64.21.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.131
+ 100.64.61.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.106
+ 100.64.17.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.202
+ 100.64.37.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.78
+ 100.64.15.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.198
+ 100.64.26.198
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.132
+ 100.64.61.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.39
+ 100.64.15.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.106
+ 100.64.28.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.133
+ 100.64.61.133
+ []
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.61.134
+ 100.64.61.134
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.1
+ 100.64.24.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.31
+ 100.64.47.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.110
+ 100.64.8.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.66
+ 100.64.23.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.135
+ 100.64.61.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+ INCIDENT_LINK
+ 1715898141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c35aea70-13d2-11ef-ac06-779f33eb9435
+
+
+
diff --git a/graph/incidents_graphml/c/c369d4d0-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c369d4d0-24b8-11ef-9f46-91603b00c012.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f151dfed48559a73b4a2595901b636a5dc9c0f8
--- /dev/null
+++ b/graph/incidents_graphml/c/c369d4d0-24b8-11ef-9f46-91603b00c012.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.12
+ 100.64.49.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717756144
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c369d4d0-24b8-11ef-9f46-91603b00c012
+
+
+
diff --git a/graph/incidents_graphml/c/c36cf7f0-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c36cf7f0-6bc2-11ee-ac23-0990c4be3eac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1cbf2d97d5d0cb09f23c4ec2fea486c00cca95b6
--- /dev/null
+++ b/graph/incidents_graphml/c/c36cf7f0-6bc2-11ee-ac23-0990c4be3eac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.184
+ 100.64.24.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697419474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c36cf7f0-6bc2-11ee-ac23-0990c4be3eac
+
+
+
diff --git a/graph/incidents_graphml/c/c36da330-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c36da330-facf-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e64562e05d99d0c6c81008ee218989c29acc5a4
--- /dev/null
+++ b/graph/incidents_graphml/c/c36da330-facf-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.30.1
+ 100.64.30.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685000576
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c36da330-facf-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/c/c379af60-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/c/c379af60-5bee-11ee-82a0-9da780b0dcc4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e4c55763c82af7625f04fcac30a17d51d5b693f
--- /dev/null
+++ b/graph/incidents_graphml/c/c379af60-5bee-11ee-82a0-9da780b0dcc4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.229
+ 100.64.22.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695679153
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c379af60-5bee-11ee-82a0-9da780b0dcc4
+
+
+
diff --git a/graph/incidents_graphml/c/c37cf530-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/c37cf530-ee30-11ec-9c18-c95a461c6308.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69144b9ca2a2816fe983c548c44e898202496c90
--- /dev/null
+++ b/graph/incidents_graphml/c/c37cf530-ee30-11ec-9c18-c95a461c6308.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.115
+ 100.64.13.115
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.88
+ 100.64.72.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655465374
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c37cf530-ee30-11ec-9c18-c95a461c6308
+
+
+ INCIDENT_LINK
+ 1655465374
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c37cf530-ee30-11ec-9c18-c95a461c6308
+
+
+
diff --git a/graph/incidents_graphml/c/c37eab30-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c37eab30-6bc2-11ee-ac23-0990c4be3eac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6416d57ca52ce2930ea90834336cdded51acfe84
--- /dev/null
+++ b/graph/incidents_graphml/c/c37eab30-6bc2-11ee-ac23-0990c4be3eac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.184
+ 100.64.24.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697419474
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c37eab30-6bc2-11ee-ac23-0990c4be3eac
+
+
+
diff --git a/graph/incidents_graphml/c/c381c710-3c70-11ee-89e7-7976671c0f18.graphml b/graph/incidents_graphml/c/c381c710-3c70-11ee-89e7-7976671c0f18.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86e8178b83b06745e62509fb7aef72a5ecc7955b
--- /dev/null
+++ b/graph/incidents_graphml/c/c381c710-3c70-11ee-89e7-7976671c0f18.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.175
+ 100.64.12.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1692216550
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c381c710-3c70-11ee-89e7-7976671c0f18
+
+
+ INCIDENT_LINK
+ 1692216550
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c381c710-3c70-11ee-89e7-7976671c0f18
+
+
+
diff --git a/graph/incidents_graphml/c/c3836720-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c3836720-8de5-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25f3f2bf11e0d4811ce719e2cf3fa3a3366573d4
--- /dev/null
+++ b/graph/incidents_graphml/c/c3836720-8de5-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.116
+ 100.64.64.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701172846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3836720-8de5-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/c3843aa0-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c3843aa0-24b8-11ef-9f46-91603b00c012.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a682f317aae990e2e3ad7e9cce9fd9214bc27f4c
--- /dev/null
+++ b/graph/incidents_graphml/c/c3843aa0-24b8-11ef-9f46-91603b00c012.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.159
+ 100.64.32.159
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717756144
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c3843aa0-24b8-11ef-9f46-91603b00c012
+
+
+
diff --git a/graph/incidents_graphml/c/c388f1a0-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/c/c388f1a0-5bee-11ee-82a0-9da780b0dcc4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32f03d5a66a1ed1aa7bc5210bcee12d72dfddc26
--- /dev/null
+++ b/graph/incidents_graphml/c/c388f1a0-5bee-11ee-82a0-9da780b0dcc4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.229
+ 100.64.22.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695679153
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c388f1a0-5bee-11ee-82a0-9da780b0dcc4
+
+
+
diff --git a/graph/incidents_graphml/c/c389fc50-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/c/c389fc50-25e6-11ee-8760-d9b0ea984292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea4f5e1429616f6c2364f82b8ab1ba5fcbe510b5
--- /dev/null
+++ b/graph/incidents_graphml/c/c389fc50-25e6-11ee-8760-d9b0ea984292.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.239
+ 100.64.64.239
+ []
+ 0.578125
+ ["Precinct"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.240
+ 100.64.64.240
+ []
+ 0.578125
+ ["Precinct"]
+
+
+ HOST
+ 100.64.64.241
+ 100.64.64.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.47
+ 100.64.7.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.242
+ 100.64.64.242
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689738354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c389fc50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c389fc50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c389fc50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c389fc50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c389fc50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c389fc50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c389fc50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c389fc50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c389fc50-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c389fc50-25e6-11ee-8760-d9b0ea984292
+
+
+
diff --git a/graph/incidents_graphml/c/c38d0310-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c38d0310-6bc2-11ee-ac23-0990c4be3eac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5ae570dcb29760708d8e6bd14dce360459f4e3b
--- /dev/null
+++ b/graph/incidents_graphml/c/c38d0310-6bc2-11ee-ac23-0990c4be3eac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.136
+ 100.64.14.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697419474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c38d0310-6bc2-11ee-ac23-0990c4be3eac
+
+
+
diff --git a/graph/incidents_graphml/c/c38e3340-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/c38e3340-ee30-11ec-9c18-c95a461c6308.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81df58c4e7ae64408a2758da67a5be860136e47d
--- /dev/null
+++ b/graph/incidents_graphml/c/c38e3340-ee30-11ec-9c18-c95a461c6308.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.93
+ 100.64.73.93
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655465374
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c38e3340-ee30-11ec-9c18-c95a461c6308
+
+
+ INCIDENT_LINK
+ 1655465374
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c38e3340-ee30-11ec-9c18-c95a461c6308
+
+
+
diff --git a/graph/incidents_graphml/c/c39393c0-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c39393c0-8de5-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..73774b3da5b6602806c2c82da6359be22fa073a4
--- /dev/null
+++ b/graph/incidents_graphml/c/c39393c0-8de5-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.116
+ 100.64.64.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701172846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c39393c0-8de5-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/c395c2e0-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/c/c395c2e0-5bee-11ee-82a0-9da780b0dcc4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..638e6e9105d71429f9873c30bcea4a483b194094
--- /dev/null
+++ b/graph/incidents_graphml/c/c395c2e0-5bee-11ee-82a0-9da780b0dcc4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.231
+ 100.64.22.231
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695679153
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c395c2e0-5bee-11ee-82a0-9da780b0dcc4
+
+
+
diff --git a/graph/incidents_graphml/c/c3972660-24b8-11ef-9f46-91603b00c012.graphml b/graph/incidents_graphml/c/c3972660-24b8-11ef-9f46-91603b00c012.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..804ba020eaedc3ff586deba074c3b7cd7853ab67
--- /dev/null
+++ b/graph/incidents_graphml/c/c3972660-24b8-11ef-9f46-91603b00c012.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.14
+ 100.64.49.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717756144
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c3972660-24b8-11ef-9f46-91603b00c012
+
+
+
diff --git a/graph/incidents_graphml/c/c39b7470-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c39b7470-0cab-11ee-8985-55bb832fcc7f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c928f959118317b52ffa06cc497d71305e55f3a6
--- /dev/null
+++ b/graph/incidents_graphml/c/c39b7470-0cab-11ee-8985-55bb832fcc7f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.15
+ 100.64.74.15
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.68.219
+ 100.64.68.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686964235
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c39b7470-0cab-11ee-8985-55bb832fcc7f
+
+
+
diff --git a/graph/incidents_graphml/c/c3a44bb0-fbb9-11ee-947f-6184d270644d.graphml b/graph/incidents_graphml/c/c3a44bb0-fbb9-11ee-947f-6184d270644d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc54ed332d3c067b3d7940fd625efe235ae7a801
--- /dev/null
+++ b/graph/incidents_graphml/c/c3a44bb0-fbb9-11ee-947f-6184d270644d.graphml
@@ -0,0 +1,791 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.194
+ 100.64.41.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.102
+ 100.64.20.102
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.249
+ 100.64.64.249
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.69
+ 100.64.17.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.85
+ 100.64.17.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.5
+ USER-0015-1287.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.129
+ 100.64.41.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.250
+ 100.64.64.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.161
+ 100.64.60.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.251
+ 100.64.64.251
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.252
+ 100.64.64.252
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.253
+ 100.64.64.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.254
+ 100.64.64.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.255
+ 100.64.64.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.67
+ 100.64.23.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.1
+ 100.64.65.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.1
+ 100.64.65.1
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.66
+ 100.64.18.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.119
+ 100.64.22.119
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.2
+ 100.64.65.2
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+ INCIDENT_LINK
+ 1713248576
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3a44bb0-fbb9-11ee-947f-6184d270644d
+
+
+
diff --git a/graph/incidents_graphml/c/c3a4b700-5bee-11ee-82a0-9da780b0dcc4.graphml b/graph/incidents_graphml/c/c3a4b700-5bee-11ee-82a0-9da780b0dcc4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcb30580c618be13a87a5d4aeaceda0a1fa669ce
--- /dev/null
+++ b/graph/incidents_graphml/c/c3a4b700-5bee-11ee-82a0-9da780b0dcc4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.231
+ 100.64.22.231
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695679153
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c3a4b700-5bee-11ee-82a0-9da780b0dcc4
+
+
+
diff --git a/graph/incidents_graphml/c/c3b4e560-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c3b4e560-facf-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ab520635a26ca8aa74e8a1db45b5989161ce190
--- /dev/null
+++ b/graph/incidents_graphml/c/c3b4e560-facf-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.2
+ 100.64.30.2
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685000576
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3b4e560-facf-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/c/c3b61660-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/c3b61660-4ceb-11ee-b223-133fe64c82b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0b7f64557ce4361e9274a47647d862183f1979f
--- /dev/null
+++ b/graph/incidents_graphml/c/c3b61660-4ceb-11ee-b223-133fe64c82b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.122
+ 100.64.36.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694028598
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c3b61660-4ceb-11ee-b223-133fe64c82b5
+
+
+
diff --git a/graph/incidents_graphml/c/c3c42020-4ceb-11ee-b223-133fe64c82b5.graphml b/graph/incidents_graphml/c/c3c42020-4ceb-11ee-b223-133fe64c82b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc600bdef098719d3d3e32eb1bb8be1cad800f00
--- /dev/null
+++ b/graph/incidents_graphml/c/c3c42020-4ceb-11ee-b223-133fe64c82b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.122
+ 100.64.36.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694028598
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c3c42020-4ceb-11ee-b223-133fe64c82b5
+
+
+
diff --git a/graph/incidents_graphml/c/c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b.graphml b/graph/incidents_graphml/c/c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad89c00267586503cd26875e125d6d091c1045b4
--- /dev/null
+++ b/graph/incidents_graphml/c/c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.71
+ 100.64.17.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.120
+ 100.64.5.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.17.72
+ 100.64.17.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.73
+ 100.64.17.73
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.74
+ 100.64.17.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.13
+ 100.64.2.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.75
+ 100.64.17.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+ INCIDENT_LINK
+ 1714030260
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3c5bb60-02d5-11ef-8e1f-0f6fc7e8988b
+
+
+
diff --git a/graph/incidents_graphml/c/c3c67c10-0cab-11ee-8985-55bb832fcc7f.graphml b/graph/incidents_graphml/c/c3c67c10-0cab-11ee-8985-55bb832fcc7f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4d00d1d65ca76186fcad1610afd120548e0122d
--- /dev/null
+++ b/graph/incidents_graphml/c/c3c67c10-0cab-11ee-8985-55bb832fcc7f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.120
+ 100.64.8.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.216
+ HOST-13084
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686964236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c3c67c10-0cab-11ee-8985-55bb832fcc7f
+
+
+
diff --git a/graph/incidents_graphml/c/c3cc3df0-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c3cc3df0-facf-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f066efaa3547efb55eb8dfc300508dd6259fbc1
--- /dev/null
+++ b/graph/incidents_graphml/c/c3cc3df0-facf-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.30.2
+ 100.64.30.2
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685000576
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c3cc3df0-facf-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/c/c3d30900-925f-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/c/c3d30900-925f-11ee-ac87-cff3005068fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d3eaca7abad5d30265d2350a412aefaeec9eae5f
--- /dev/null
+++ b/graph/incidents_graphml/c/c3d30900-925f-11ee-ac87-cff3005068fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.34
+ 100.64.6.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701665050
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c3d30900-925f-11ee-ac87-cff3005068fb
+
+
+
diff --git a/graph/incidents_graphml/c/c3e51d20-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c3e51d20-facf-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70e3aefa5e428fe173d0792c54a70289f87cdd7f
--- /dev/null
+++ b/graph/incidents_graphml/c/c3e51d20-facf-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.4
+ 100.64.30.4
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685000577
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c3e51d20-facf-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/c/c3f03050-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c3f03050-50a8-11ee-9ae0-a3d3a7298a83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..946dc642c8f59e5b4101402b0addf7fc4aa1cc9c
--- /dev/null
+++ b/graph/incidents_graphml/c/c3f03050-50a8-11ee-9ae0-a3d3a7298a83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.191
+ 100.64.19.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694439626
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c3f03050-50a8-11ee-9ae0-a3d3a7298a83
+
+
+
diff --git a/graph/incidents_graphml/c/c3f8fa00-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/c/c3f8fa00-138b-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05f4843b1d39d77e2b5266ce3b6b42dd833ed614
--- /dev/null
+++ b/graph/incidents_graphml/c/c3f8fa00-138b-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.161.94.89
+ 10.161.94.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.74.79
+ 100.64.74.79
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687720150
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3f8fa00-138b-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687720150
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3f8fa00-138b-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/c/c3fb6440-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c3fb6440-facf-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2cbfe69c66cd14f980b505b30bc2e9cf08d14c7d
--- /dev/null
+++ b/graph/incidents_graphml/c/c3fb6440-facf-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.30.4
+ 100.64.30.4
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685000577
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c3fb6440-facf-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/c/c3fd9e70-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/c/c3fd9e70-182c-11ee-b591-f5bec484f8bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69a3db56bb61e6eb79c546b14f59c7fdcc92c924
--- /dev/null
+++ b/graph/incidents_graphml/c/c3fd9e70-182c-11ee-b591-f5bec484f8bc.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.90.111
+ 192.168.90.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.0.105
+ 100.64.0.105
+ ["Exploiting Target","Exploiting Host"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 192.168.237.216
+ 192.168.237.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 192.168.154.238
+ 192.168.154.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1688229104
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3fd9e70-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229104
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3fd9e70-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229104
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3fd9e70-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229104
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3fd9e70-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229104
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3fd9e70-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229104
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c3fd9e70-182c-11ee-b591-f5bec484f8bc
+
+
+
diff --git a/graph/incidents_graphml/c/c3fde3a0-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c3fde3a0-3517-11ee-8486-31c54e05c523.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d1866450b31e92a8c94993ea74091d05cf34248
--- /dev/null
+++ b/graph/incidents_graphml/c/c3fde3a0-3517-11ee-8486-31c54e05c523.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.114
+ USER-0015-1204.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408668
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c3fde3a0-3517-11ee-8486-31c54e05c523
+
+
+
diff --git a/graph/incidents_graphml/c/c3ff7290-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c3ff7290-50a8-11ee-9ae0-a3d3a7298a83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b70336df5010aac3049b3b6018e665be06411962
--- /dev/null
+++ b/graph/incidents_graphml/c/c3ff7290-50a8-11ee-9ae0-a3d3a7298a83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.191
+ 100.64.19.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694439626
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c3ff7290-50a8-11ee-9ae0-a3d3a7298a83
+
+
+
diff --git a/graph/incidents_graphml/c/c40f5110-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c40f5110-50a8-11ee-9ae0-a3d3a7298a83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c15a62ff2e65f70e5d1745b6f4d8745f2fe3013
--- /dev/null
+++ b/graph/incidents_graphml/c/c40f5110-50a8-11ee-9ae0-a3d3a7298a83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.190
+ 100.64.7.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694439626
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c40f5110-50a8-11ee-9ae0-a3d3a7298a83
+
+
+
diff --git a/graph/incidents_graphml/c/c421e8d0-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/c421e8d0-fa48-11ee-a230-bfe539a81cf2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0053297e3e40261afd3a772ebbba7cf9875542e
--- /dev/null
+++ b/graph/incidents_graphml/c/c421e8d0-fa48-11ee-a230-bfe539a81cf2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.126
+ 100.64.41.126
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713090093
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c421e8d0-fa48-11ee-a230-bfe539a81cf2
+
+
+
diff --git a/graph/incidents_graphml/c/c42c3650-0da9-11ee-812a-a702327978d7.graphml b/graph/incidents_graphml/c/c42c3650-0da9-11ee-812a-a702327978d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24d25ec246dff939c36288d39f2db84879ae31d6
--- /dev/null
+++ b/graph/incidents_graphml/c/c42c3650-0da9-11ee-812a-a702327978d7.graphml
@@ -0,0 +1,689 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.118
+ 100.64.25.118
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.119
+ USER-0015-1254.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.120
+ 100.64.25.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.121
+ 100.64.25.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.34
+ 100.64.14.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.122
+ 100.64.25.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.123
+ 100.64.25.123
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.124
+ 100.64.25.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.125
+ 100.64.25.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.126
+ 100.64.25.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.127
+ 100.64.25.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.128
+ 100.64.25.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.248
+ USER-0015-1255.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.93
+ 100.64.9.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.47
+ 100.64.8.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.248
+ 100.64.17.248
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+ INCIDENT_LINK
+ 1687073328
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c42c3650-0da9-11ee-812a-a702327978d7
+
+
+
diff --git a/graph/incidents_graphml/c/c4303e40-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c4303e40-3517-11ee-8486-31c54e05c523.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c9ea4e7ba7569228cfc5b673f0a1f1b920702a3
--- /dev/null
+++ b/graph/incidents_graphml/c/c4303e40-3517-11ee-8486-31c54e05c523.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408668
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4303e40-3517-11ee-8486-31c54e05c523
+
+
+ INCIDENT_LINK
+ 1691408668
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4303e40-3517-11ee-8486-31c54e05c523
+
+
+
diff --git a/graph/incidents_graphml/c/c4313c70-f766-11ee-a32a-474576cc2660.graphml b/graph/incidents_graphml/c/c4313c70-f766-11ee-a32a-474576cc2660.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5cfc30b57a190176323c81469ec5590b2c79a5a4
--- /dev/null
+++ b/graph/incidents_graphml/c/c4313c70-f766-11ee-a32a-474576cc2660.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.66.39.5
+ HOST-12435
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","Vulnerability Management","Cortex XDR","Windows Active Directory"]
+
+
+ HOST
+ 100.64.70.123
+ 100.64.70.123
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1712773124
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4313c70-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773124
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4313c70-f766-11ee-a32a-474576cc2660
+
+
+
diff --git a/graph/incidents_graphml/c/c442f850-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/c/c442f850-1fe1-11ee-80ac-1985e110d782.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..23966e75fa36c522876ddd861e6157483ef43118
--- /dev/null
+++ b/graph/incidents_graphml/c/c442f850-1fe1-11ee-80ac-1985e110d782.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.231
+ 100.64.39.231
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689076501
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c442f850-1fe1-11ee-80ac-1985e110d782
+
+
+
diff --git a/graph/incidents_graphml/c/c45742e0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/c/c45742e0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..845fbd42e44c3e0f5e01a4e4593e0eeb46e6bd2c
--- /dev/null
+++ b/graph/incidents_graphml/c/c45742e0-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.90
+ 100.64.78.90
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.159
+ 100.64.1.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657069116
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c45742e0-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069116
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c45742e0-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/c/c459e2b0-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/c/c459e2b0-f613-11ed-a3d6-ad85d59eee66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f54d758d5ca09303e61eb2ad9d19b667b9d83f8b
--- /dev/null
+++ b/graph/incidents_graphml/c/c459e2b0-f613-11ed-a3d6-ad85d59eee66.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.33
+ 100.64.52.33
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.77.174
+ 100.64.77.174
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.175
+ 100.64.77.175
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1684480027
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c459e2b0-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480027
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c459e2b0-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480027
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c459e2b0-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480027
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c459e2b0-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480027
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c459e2b0-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480027
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c459e2b0-f613-11ed-a3d6-ad85d59eee66
+
+
+
diff --git a/graph/incidents_graphml/c/c4606fc0-fbb9-11ee-947f-6184d270644d.graphml b/graph/incidents_graphml/c/c4606fc0-fbb9-11ee-947f-6184d270644d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6ba248b05a213de2a90df0ef898f3a88b132fe9
--- /dev/null
+++ b/graph/incidents_graphml/c/c4606fc0-fbb9-11ee-947f-6184d270644d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.101
+ 100.64.32.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713248577
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4606fc0-fbb9-11ee-947f-6184d270644d
+
+
+
diff --git a/graph/incidents_graphml/c/c4660f40-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/c/c4660f40-11c0-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..441d997b58b1a9aee7d924da2ed990b2e5aa37ab
--- /dev/null
+++ b/graph/incidents_graphml/c/c4660f40-11c0-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.111
+ 100.64.82.111
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.125
+ 100.64.71.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687523012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4660f40-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687523012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4660f40-11c0-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/c/c467c900-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c467c900-3517-11ee-8486-31c54e05c523.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e41c125a346fd7e88ae8d2189cbdd6901aad4e98
--- /dev/null
+++ b/graph/incidents_graphml/c/c467c900-3517-11ee-8486-31c54e05c523.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408669
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c467c900-3517-11ee-8486-31c54e05c523
+
+
+
diff --git a/graph/incidents_graphml/c/c46efd40-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c46efd40-50a8-11ee-9ae0-a3d3a7298a83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ece6a1d27f2236ed60b4de6c0aa8d32136861ec
--- /dev/null
+++ b/graph/incidents_graphml/c/c46efd40-50a8-11ee-9ae0-a3d3a7298a83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.103
+ 100.64.27.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694439627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c46efd40-50a8-11ee-9ae0-a3d3a7298a83
+
+
+
diff --git a/graph/incidents_graphml/c/c4763be0-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/c/c4763be0-11c0-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ada1400ed7ddd2cbb9b62ce38e8d92659b8f70f
--- /dev/null
+++ b/graph/incidents_graphml/c/c4763be0-11c0-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.112
+ 100.64.82.112
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.3
+ 100.64.72.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687523012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4763be0-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687523012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4763be0-11c0-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/c/c4766b60-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/c/c4766b60-f613-11ed-a3d6-ad85d59eee66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe0f79a23e4fcff66721c8884125eb5d70499739
--- /dev/null
+++ b/graph/incidents_graphml/c/c4766b60-f613-11ed-a3d6-ad85d59eee66.graphml
@@ -0,0 +1,617 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.71.130
+ 100.64.71.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.15.246
+ 100.64.15.246
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.65.32
+ 100.64.65.32
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.100
+ 100.64.71.100
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.74.72
+ 100.64.74.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.14.48
+ 100.64.14.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.176
+ 100.64.77.176
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.177
+ 100.64.77.177
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.178
+ 100.64.77.178
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.255
+ 100.64.70.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.73.58
+ 100.64.73.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.13.89
+ 100.64.13.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.52
+ 100.64.72.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.236
+ 100.64.75.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.4.90
+ 100.64.4.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.179
+ 100.64.77.179
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4766b60-f613-11ed-a3d6-ad85d59eee66
+
+
+
diff --git a/graph/incidents_graphml/c/c4795b20-925f-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/c/c4795b20-925f-11ee-ac87-cff3005068fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7ab53cb7c5db271de2bae0e6b3d550774974099
--- /dev/null
+++ b/graph/incidents_graphml/c/c4795b20-925f-11ee-ac87-cff3005068fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.186
+ 100.64.66.186
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701665051
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4795b20-925f-11ee-ac87-cff3005068fb
+
+
+
diff --git a/graph/incidents_graphml/c/c47f6d80-1815-11ef-a290-d5e92fd7ebc0.graphml b/graph/incidents_graphml/c/c47f6d80-1815-11ef-a290-d5e92fd7ebc0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f6e7388ad0b20f8a37cfdf0e7483a12dc8f7692
--- /dev/null
+++ b/graph/incidents_graphml/c/c47f6d80-1815-11ef-a290-d5e92fd7ebc0.graphml
@@ -0,0 +1,177 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.127
+ HOST-17376
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.46.208
+ 172.16.46.208
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.128
+ 100.64.87.128
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1716366724
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c47f6d80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366724
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c47f6d80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366724
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c47f6d80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366724
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c47f6d80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366724
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c47f6d80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366724
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c47f6d80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366724
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c47f6d80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366724
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c47f6d80-1815-11ef-a290-d5e92fd7ebc0
+
+
+
diff --git a/graph/incidents_graphml/c/c47f75a0-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c47f75a0-0e89-11ee-9188-256b81e0b008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8536cfcb5f1a7ebdb848d2bc3efd03103714c3cf
--- /dev/null
+++ b/graph/incidents_graphml/c/c47f75a0-0e89-11ee-9188-256b81e0b008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.186
+ 100.64.38.186
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687169536
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c47f75a0-0e89-11ee-9188-256b81e0b008
+
+
+
diff --git a/graph/incidents_graphml/c/c480d790-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c480d790-50a8-11ee-9ae0-a3d3a7298a83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4fabd7827dde4c54a68687c63354847d38810e07
--- /dev/null
+++ b/graph/incidents_graphml/c/c480d790-50a8-11ee-9ae0-a3d3a7298a83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.103
+ 100.64.27.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694439627
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c480d790-50a8-11ee-9ae0-a3d3a7298a83
+
+
+
diff --git a/graph/incidents_graphml/c/c48579b0-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/c/c48579b0-bcf3-11ed-9421-6db30872eff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..561c67af4d587b120b3113bb4c2c0df69abb54c8
--- /dev/null
+++ b/graph/incidents_graphml/c/c48579b0-bcf3-11ed-9421-6db30872eff3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.171.156
+ 192.168.171.156
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.40
+ 100.64.86.40
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678199067
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c48579b0-bcf3-11ed-9421-6db30872eff3
+
+
+ INCIDENT_LINK
+ 1678199067
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c48579b0-bcf3-11ed-9421-6db30872eff3
+
+
+
diff --git a/graph/incidents_graphml/c/c486b6a0-11c0-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/c/c486b6a0-11c0-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe6836978a363c8d5ecd9f972dd64c41a02cc5a8
--- /dev/null
+++ b/graph/incidents_graphml/c/c486b6a0-11c0-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.154
+ 100.64.11.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.222
+ 100.64.71.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687523012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c486b6a0-11c0-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687523012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c486b6a0-11c0-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/c/c48e2e60-facf-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/c/c48e2e60-facf-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c399fb3a2182a2ac515a5d32ba6464b925d7878d
--- /dev/null
+++ b/graph/incidents_graphml/c/c48e2e60-facf-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.983125
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685000578
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c48e2e60-facf-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/c/c48f9c50-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c48f9c50-3517-11ee-8486-31c54e05c523.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7765d2fb945f55633275264e2404ee5f67a0d30f
--- /dev/null
+++ b/graph/incidents_graphml/c/c48f9c50-3517-11ee-8486-31c54e05c523.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.149
+ USER-0015-1235.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408669
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c48f9c50-3517-11ee-8486-31c54e05c523
+
+
+
diff --git a/graph/incidents_graphml/c/c4905c00-f613-11ed-a3d6-ad85d59eee66.graphml b/graph/incidents_graphml/c/c4905c00-f613-11ed-a3d6-ad85d59eee66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d90cccf26de703dfcd0296395ff966ba5d15f3ac
--- /dev/null
+++ b/graph/incidents_graphml/c/c4905c00-f613-11ed-a3d6-ad85d59eee66.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.254
+ 100.64.17.254
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.180
+ 100.64.77.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.77.181
+ 100.64.77.181
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4905c00-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4905c00-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4905c00-f613-11ed-a3d6-ad85d59eee66
+
+
+ INCIDENT_LINK
+ 1684480028
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4905c00-f613-11ed-a3d6-ad85d59eee66
+
+
+
diff --git a/graph/incidents_graphml/c/c49067f0-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c49067f0-50a8-11ee-9ae0-a3d3a7298a83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88c2e98c28e4f57a38a13462d4fe85db9c512ee7
--- /dev/null
+++ b/graph/incidents_graphml/c/c49067f0-50a8-11ee-9ae0-a3d3a7298a83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.105
+ 100.64.27.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694439627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c49067f0-50a8-11ee-9ae0-a3d3a7298a83
+
+
+
diff --git a/graph/incidents_graphml/c/c49bfe50-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c49bfe50-0e89-11ee-9188-256b81e0b008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8099d55497e1e043166f95467bc5aa18ff387e5
--- /dev/null
+++ b/graph/incidents_graphml/c/c49bfe50-0e89-11ee-9188-256b81e0b008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.186
+ 100.64.38.186
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687169536
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c49bfe50-0e89-11ee-9188-256b81e0b008
+
+
+
diff --git a/graph/incidents_graphml/c/c49dbd40-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c49dbd40-789b-11ee-8d62-1fa49ad9521f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..879671bead3846757fe036754ba04b2edf14b3bf
--- /dev/null
+++ b/graph/incidents_graphml/c/c49dbd40-789b-11ee-8d62-1fa49ad9521f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.204
+ 100.64.2.204
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698832091
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c49dbd40-789b-11ee-8d62-1fa49ad9521f
+
+
+
diff --git a/graph/incidents_graphml/c/c49dcf50-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c49dcf50-8a99-11ee-b145-63bb68632209.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d48a54397dd88d6895d0a68b2b57b8171c4b285e
--- /dev/null
+++ b/graph/incidents_graphml/c/c49dcf50-8a99-11ee-b145-63bb68632209.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.36
+ 100.64.41.36
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700810352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c49dcf50-8a99-11ee-b145-63bb68632209
+
+
+
diff --git a/graph/incidents_graphml/c/c4a52af0-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/c/c4a52af0-ed53-11ec-8964-796320a841f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8a17fb12a07f7110d3dca7cd35f3b74664e7faf
--- /dev/null
+++ b/graph/incidents_graphml/c/c4a52af0-ed53-11ec-8964-796320a841f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.51
+ USER-0015-1783.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.175
+ 100.64.79.175
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655370457
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4a52af0-ed53-11ec-8964-796320a841f1
+
+
+ INCIDENT_LINK
+ 1655370457
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4a52af0-ed53-11ec-8964-796320a841f1
+
+
+
diff --git a/graph/incidents_graphml/c/c4a5ed20-6bc2-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/c/c4a5ed20-6bc2-11ee-ac23-0990c4be3eac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b82bb35827645bd36535002c8c445461870ef8f
--- /dev/null
+++ b/graph/incidents_graphml/c/c4a5ed20-6bc2-11ee-ac23-0990c4be3eac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.127
+ 100.64.62.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697419476
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4a5ed20-6bc2-11ee-ac23-0990c4be3eac
+
+
+
diff --git a/graph/incidents_graphml/c/c4a6d760-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4a6d760-6386-11ee-9eed-775092596c34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65d9cbe1c6198708b5da9f4ebc56f297b316f935
--- /dev/null
+++ b/graph/incidents_graphml/c/c4a6d760-6386-11ee-9eed-775092596c34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.98
+ 100.64.17.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696514097
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4a6d760-6386-11ee-9eed-775092596c34
+
+
+
diff --git a/graph/incidents_graphml/c/c4a76c90-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c4a76c90-8454-11ee-ad04-df7d06c31c2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86ced43b8715ec37eb8af6b3d499dd5a40b459a4
--- /dev/null
+++ b/graph/incidents_graphml/c/c4a76c90-8454-11ee-ad04-df7d06c31c2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.179
+ 100.64.33.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700121010
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4a76c90-8454-11ee-ad04-df7d06c31c2e
+
+
+
diff --git a/graph/incidents_graphml/c/c4ae4a10-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c4ae4a10-8a99-11ee-b145-63bb68632209.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1b61c3352aa3c4ec399360ddd4dcaca46049e7e
--- /dev/null
+++ b/graph/incidents_graphml/c/c4ae4a10-8a99-11ee-b145-63bb68632209.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.254
+ 100.64.3.254
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700810353
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4ae4a10-8a99-11ee-b145-63bb68632209
+
+
+
diff --git a/graph/incidents_graphml/c/c4af61b0-3027-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/c/c4af61b0-3027-11ee-a433-a916fb2bb25a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c61ff5d961056de63c629f0ec3aca6a58455ecc
--- /dev/null
+++ b/graph/incidents_graphml/c/c4af61b0-3027-11ee-a433-a916fb2bb25a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.71
+ 100.64.69.71
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.29.39
+ 100.64.29.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690865785
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4af61b0-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865785
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4af61b0-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865785
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4af61b0-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865785
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4af61b0-3027-11ee-a433-a916fb2bb25a
+
+
+
diff --git a/graph/incidents_graphml/c/c4b24570-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c4b24570-0e89-11ee-9188-256b81e0b008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ebfd18a1b50e05719edabdbc6a0f1a6a1bd29cd
--- /dev/null
+++ b/graph/incidents_graphml/c/c4b24570-0e89-11ee-9188-256b81e0b008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.31
+ 100.64.25.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687169536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4b24570-0e89-11ee-9188-256b81e0b008
+
+
+
diff --git a/graph/incidents_graphml/c/c4b27020-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4b27020-6386-11ee-9eed-775092596c34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..796785c46159f867cd96e7db87ccbdfe367a74c4
--- /dev/null
+++ b/graph/incidents_graphml/c/c4b27020-6386-11ee-9eed-775092596c34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.224
+ 100.64.51.224
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696514097
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4b27020-6386-11ee-9eed-775092596c34
+
+
+
diff --git a/graph/incidents_graphml/c/c4bfdda0-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4bfdda0-6386-11ee-9eed-775092596c34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b56359bd2732e656fdf4a66e6d52b62c0e014236
--- /dev/null
+++ b/graph/incidents_graphml/c/c4bfdda0-6386-11ee-9eed-775092596c34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.224
+ 100.64.51.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696514097
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4bfdda0-6386-11ee-9eed-775092596c34
+
+
+
diff --git a/graph/incidents_graphml/c/c4c88c90-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c4c88c90-0e89-11ee-9188-256b81e0b008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf2466c2e2f778e8fbd22d4c681e765221a4425d
--- /dev/null
+++ b/graph/incidents_graphml/c/c4c88c90-0e89-11ee-9188-256b81e0b008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.31
+ 100.64.25.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687169537
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4c88c90-0e89-11ee-9188-256b81e0b008
+
+
+
diff --git a/graph/incidents_graphml/c/c4cc39b0-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4cc39b0-6386-11ee-9eed-775092596c34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b94ce0a4daefbb417d7fa0b25817fa7c18dbe36
--- /dev/null
+++ b/graph/incidents_graphml/c/c4cc39b0-6386-11ee-9eed-775092596c34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.226
+ 100.64.51.226
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696514097
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4cc39b0-6386-11ee-9eed-775092596c34
+
+
+
diff --git a/graph/incidents_graphml/c/c4cd5d40-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/c/c4cd5d40-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c387d82afc16555d64392d753871e25fce6b3b07
--- /dev/null
+++ b/graph/incidents_graphml/c/c4cd5d40-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.73
+ 100.64.38.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.36
+ 100.64.73.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657069117
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4cd5d40-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069117
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4cd5d40-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/c/c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/c/c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f671f8b43ff9f0a23f60ced3c19908ceded93283
--- /dev/null
+++ b/graph/incidents_graphml/c/c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.109
+ USER-0015-1627.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.251
+ 100.64.71.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.54.98
+ 100.64.54.98
+ ["Exploiting Target","Exploiting Host"]
+ 0.9634375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657069117
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069117
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069117
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657069117
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4cf5910-fcc6-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/c/c4d0ed40-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c4d0ed40-8a99-11ee-b145-63bb68632209.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f5d2428d4a8010b9ada06553aeae639483e6967
--- /dev/null
+++ b/graph/incidents_graphml/c/c4d0ed40-8a99-11ee-b145-63bb68632209.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.38
+ 100.64.41.38
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700810353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4d0ed40-8a99-11ee-b145-63bb68632209
+
+
+
diff --git a/graph/incidents_graphml/c/c4d24510-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c4d24510-7459-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a054f87432b0516e8a8ab4be8dbf6627288e3e7
--- /dev/null
+++ b/graph/incidents_graphml/c/c4d24510-7459-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.24
+ 100.64.14.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698363939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4d24510-7459-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/c/c4da6a80-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4da6a80-6386-11ee-9eed-775092596c34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd2cf88594e615ce5abd89e28bee0a6be39ef0a1
--- /dev/null
+++ b/graph/incidents_graphml/c/c4da6a80-6386-11ee-9eed-775092596c34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.226
+ 100.64.51.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696514097
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4da6a80-6386-11ee-9eed-775092596c34
+
+
+
diff --git a/graph/incidents_graphml/c/c4df9110-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c4df9110-3517-11ee-8486-31c54e05c523.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6052ba34d6d8e448c190e3cd8e03103a211771be
--- /dev/null
+++ b/graph/incidents_graphml/c/c4df9110-3517-11ee-8486-31c54e05c523.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.22
+ 100.64.21.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408670
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4df9110-3517-11ee-8486-31c54e05c523
+
+
+
diff --git a/graph/incidents_graphml/c/c4e221d0-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c4e221d0-1228-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b86cab475ddd293a39640f0a6046c0a56c12aa0
--- /dev/null
+++ b/graph/incidents_graphml/c/c4e221d0-1228-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.213
+ 100.64.80.213
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687567680
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4e221d0-1228-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/c/c4e49490-7459-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/c/c4e49490-7459-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86b8c0fb7c800d3dd84c626a53038e20696ed70e
--- /dev/null
+++ b/graph/incidents_graphml/c/c4e49490-7459-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.24
+ 100.64.14.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698363940
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4e49490-7459-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/c/c4e90ce0-925f-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/c/c4e90ce0-925f-11ee-ac87-cff3005068fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5633ee8a4bc8498441b7b270dc5bbf7a09a2a632
--- /dev/null
+++ b/graph/incidents_graphml/c/c4e90ce0-925f-11ee-ac87-cff3005068fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.188
+ 100.64.66.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701665051
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4e90ce0-925f-11ee-ac87-cff3005068fb
+
+
+
diff --git a/graph/incidents_graphml/c/c4e9cc70-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c4e9cc70-8a99-11ee-b145-63bb68632209.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35059caa066e31970f3c3f4cdb0570b120f86442
--- /dev/null
+++ b/graph/incidents_graphml/c/c4e9cc70-8a99-11ee-b145-63bb68632209.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.38
+ 100.64.41.38
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700810353
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4e9cc70-8a99-11ee-b145-63bb68632209
+
+
+
diff --git a/graph/incidents_graphml/c/c4ed1300-3150-11ee-9a81-45e5b946e7a5.graphml b/graph/incidents_graphml/c/c4ed1300-3150-11ee-9a81-45e5b946e7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f7ff57a2886c9f731c52ac6259ad7c82279bbfd
--- /dev/null
+++ b/graph/incidents_graphml/c/c4ed1300-3150-11ee-9a81-45e5b946e7a5.graphml
@@ -0,0 +1,193 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.91
+ 100.64.9.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.92
+ 100.64.9.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.93
+ 100.64.9.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.94
+ 100.64.9.94
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690993346
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4ed1300-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993346
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4ed1300-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993346
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4ed1300-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993346
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4ed1300-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993346
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4ed1300-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993346
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4ed1300-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993346
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4ed1300-3150-11ee-9a81-45e5b946e7a5
+
+
+ INCIDENT_LINK
+ 1690993346
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4ed1300-3150-11ee-9a81-45e5b946e7a5
+
+
+
diff --git a/graph/incidents_graphml/c/c4f0d8b0-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4f0d8b0-6386-11ee-9eed-775092596c34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b2be9df6abb4b9da14415e97131f3bed35687ae
--- /dev/null
+++ b/graph/incidents_graphml/c/c4f0d8b0-6386-11ee-9eed-775092596c34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.228
+ 100.64.51.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696514097
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4f0d8b0-6386-11ee-9eed-775092596c34
+
+
+
diff --git a/graph/incidents_graphml/c/c4fa8bd0-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c4fa8bd0-1228-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54bbbaea381a651d711bc0a406b321ed123ed726
--- /dev/null
+++ b/graph/incidents_graphml/c/c4fa8bd0-1228-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.216
+ 100.64.80.216
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687567680
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c4fa8bd0-1228-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/c/c4fd0a10-925f-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/c/c4fd0a10-925f-11ee-ac87-cff3005068fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c87f2118e4b0bee64f4b5ff3fa5ca21a8b5f150a
--- /dev/null
+++ b/graph/incidents_graphml/c/c4fd0a10-925f-11ee-ac87-cff3005068fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.188
+ 100.64.66.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701665052
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fd0a10-925f-11ee-ac87-cff3005068fb
+
+
+
diff --git a/graph/incidents_graphml/c/c4fdcfc0-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c4fdcfc0-50a8-11ee-9ae0-a3d3a7298a83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00bc9f3c74e63676c161c3e374fa4d26e1c87042
--- /dev/null
+++ b/graph/incidents_graphml/c/c4fdcfc0-50a8-11ee-9ae0-a3d3a7298a83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.117
+ 100.64.18.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694439628
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c4fdcfc0-50a8-11ee-9ae0-a3d3a7298a83
+
+
+
diff --git a/graph/incidents_graphml/c/c4fe3c30-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c4fe3c30-6665-11ee-9e3e-f968222332ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f75e3155c7730e453dbbc00f4526eb078f4b90b
--- /dev/null
+++ b/graph/incidents_graphml/c/c4fe3c30-6665-11ee-9e3e-f968222332ec.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.18
+ 100.64.7.18
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.129
+ 100.64.35.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.216
+ 100.64.14.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.129
+ 100.64.57.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.144
+ 100.64.55.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.187
+ 100.64.52.187
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.130
+ 100.64.57.130
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.131
+ 100.64.57.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.132
+ 100.64.57.132
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.133
+ 100.64.57.133
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.134
+ 100.64.57.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.135
+ 100.64.57.135
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.136
+ 100.64.57.136
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.137
+ USER-0015-1423.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.8
+ 100.64.12.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.138
+ 100.64.57.138
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.139
+ 100.64.57.139
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.140
+ 100.64.57.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.72
+ 100.64.15.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+ INCIDENT_LINK
+ 1696829777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c4fe3c30-6665-11ee-9e3e-f968222332ec
+
+
+
diff --git a/graph/incidents_graphml/c/c4ff3090-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c4ff3090-6386-11ee-9eed-775092596c34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e7910a1868bc75f4bd6f1e83761f21a4c20a72d
--- /dev/null
+++ b/graph/incidents_graphml/c/c4ff3090-6386-11ee-9eed-775092596c34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.228
+ 100.64.51.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696514097
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c4ff3090-6386-11ee-9eed-775092596c34
+
+
+
diff --git a/graph/incidents_graphml/c/c4ffc570-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c4ffc570-8a99-11ee-b145-63bb68632209.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8e2764d18405a7dad7edccff4836a12f8bbd010
--- /dev/null
+++ b/graph/incidents_graphml/c/c4ffc570-8a99-11ee-b145-63bb68632209.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.40
+ 100.64.41.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700810353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c4ffc570-8a99-11ee-b145-63bb68632209
+
+
+
diff --git a/graph/incidents_graphml/c/c501b020-a2d5-11ee-8541-6f03abc6c851.graphml b/graph/incidents_graphml/c/c501b020-a2d5-11ee-8541-6f03abc6c851.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18051c7a1f1e0e94e6c64fa5067aa185a0eaa011
--- /dev/null
+++ b/graph/incidents_graphml/c/c501b020-a2d5-11ee-8541-6f03abc6c851.graphml
@@ -0,0 +1,279 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.222
+ 100.64.29.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.223
+ 100.64.29.223
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.72
+ 100.64.10.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.224
+ 100.64.29.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.65
+ 100.64.8.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.225
+ 100.64.29.225
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.54
+ 100.64.18.54
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474951
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c501b020-a2d5-11ee-8541-6f03abc6c851
+
+
+
diff --git a/graph/incidents_graphml/c/c504a540-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c504a540-3517-11ee-8486-31c54e05c523.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c670b3866a04f079440db4e92ceab98612e2362
--- /dev/null
+++ b/graph/incidents_graphml/c/c504a540-3517-11ee-8486-31c54e05c523.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.22
+ 100.64.21.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408670
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c504a540-3517-11ee-8486-31c54e05c523
+
+
+
diff --git a/graph/incidents_graphml/c/c50a7810-8704-11ed-bb4c-dd95bc70531e.graphml b/graph/incidents_graphml/c/c50a7810-8704-11ed-bb4c-dd95bc70531e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abf8b90e5981c756904ef81922887388526b0ab1
--- /dev/null
+++ b/graph/incidents_graphml/c/c50a7810-8704-11ed-bb4c-dd95bc70531e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.106.93.7
+ 10.106.93.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1672269007
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c50a7810-8704-11ed-bb4c-dd95bc70531e
+
+
+
diff --git a/graph/incidents_graphml/c/c50b7bc0-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c50b7bc0-1228-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..122a886e6fe7fdf1bf17d6682c884807a4cfeb12
--- /dev/null
+++ b/graph/incidents_graphml/c/c50b7bc0-1228-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.216
+ 100.64.80.216
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687567681
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c50b7bc0-1228-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/c/c50dfc60-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c50dfc60-50a8-11ee-9ae0-a3d3a7298a83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ccd3f0c10f9d305bca74a61507e0b2e50096115
--- /dev/null
+++ b/graph/incidents_graphml/c/c50dfc60-50a8-11ee-9ae0-a3d3a7298a83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.107
+ 100.64.27.107
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694439628
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c50dfc60-50a8-11ee-9ae0-a3d3a7298a83
+
+
+
diff --git a/graph/incidents_graphml/c/c50e48a0-8704-11ed-bb4c-dd95bc70531e.graphml b/graph/incidents_graphml/c/c50e48a0-8704-11ed-bb4c-dd95bc70531e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..941d087117dfc09f28387d7e16a226fde2c1c9d6
--- /dev/null
+++ b/graph/incidents_graphml/c/c50e48a0-8704-11ed-bb4c-dd95bc70531e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.106.93.7
+ 10.106.93.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1672269007
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c50e48a0-8704-11ed-bb4c-dd95bc70531e
+
+
+
diff --git a/graph/incidents_graphml/c/c5130390-8704-11ed-bb4c-dd95bc70531e.graphml b/graph/incidents_graphml/c/c5130390-8704-11ed-bb4c-dd95bc70531e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9c7c7cd1a51a6423f3b2aecf996b01219d3cdeb
--- /dev/null
+++ b/graph/incidents_graphml/c/c5130390-8704-11ed-bb4c-dd95bc70531e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.107
+ 100.64.83.107
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.106.93.7
+ 10.106.93.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1672269007
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5130390-8704-11ed-bb4c-dd95bc70531e
+
+
+
diff --git a/graph/incidents_graphml/c/c5167d20-41dc-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/c/c5167d20-41dc-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ae6f05edba838c7100dc1a9f092f2a9b8e01498
--- /dev/null
+++ b/graph/incidents_graphml/c/c5167d20-41dc-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.224
+ 100.64.67.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692812695
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5167d20-41dc-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/c/c5182f70-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c5182f70-8a99-11ee-b145-63bb68632209.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8cb4efd47356a557be9d4258cbb35e2eb2e720b
--- /dev/null
+++ b/graph/incidents_graphml/c/c5182f70-8a99-11ee-b145-63bb68632209.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.40
+ 100.64.41.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700810353
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c5182f70-8a99-11ee-b145-63bb68632209
+
+
+
diff --git a/graph/incidents_graphml/c/c518a8e0-8704-11ed-bb4c-dd95bc70531e.graphml b/graph/incidents_graphml/c/c518a8e0-8704-11ed-bb4c-dd95bc70531e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f47be0d4da931c0df680ce26e8bbc868f8b8a6a
--- /dev/null
+++ b/graph/incidents_graphml/c/c518a8e0-8704-11ed-bb4c-dd95bc70531e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.106.93.7
+ 10.106.93.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.107
+ 100.64.83.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1672269007
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c518a8e0-8704-11ed-bb4c-dd95bc70531e
+
+
+
diff --git a/graph/incidents_graphml/c/c51baf40-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c51baf40-6665-11ee-9e3e-f968222332ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9f924caf4b07287e03848963d2f361da81d0178
--- /dev/null
+++ b/graph/incidents_graphml/c/c51baf40-6665-11ee-9e3e-f968222332ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.197
+ 100.64.22.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696829778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c51baf40-6665-11ee-9e3e-f968222332ec
+
+
+
diff --git a/graph/incidents_graphml/c/c51db3d0-50a8-11ee-9ae0-a3d3a7298a83.graphml b/graph/incidents_graphml/c/c51db3d0-50a8-11ee-9ae0-a3d3a7298a83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d23efae0db9787f5f07ec0a8117b963a2d852fc8
--- /dev/null
+++ b/graph/incidents_graphml/c/c51db3d0-50a8-11ee-9ae0-a3d3a7298a83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.107
+ 100.64.27.107
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694439628
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c51db3d0-50a8-11ee-9ae0-a3d3a7298a83
+
+
+
diff --git a/graph/incidents_graphml/c/c51e1960-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c51e1960-1228-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6364ad8205a43b8f08d50ef4e3cf65b6dadcec66
--- /dev/null
+++ b/graph/incidents_graphml/c/c51e1960-1228-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.218
+ 100.64.80.218
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.246
+ 100.64.76.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.219
+ 100.64.80.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687567681
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c51e1960-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567681
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c51e1960-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567681
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c51e1960-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567681
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c51e1960-1228-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/c/c5296ae0-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c5296ae0-6665-11ee-9e3e-f968222332ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b14c9f220766c17995372f0323bfa5fb4efa7ca2
--- /dev/null
+++ b/graph/incidents_graphml/c/c5296ae0-6665-11ee-9e3e-f968222332ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.197
+ 100.64.22.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696829778
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c5296ae0-6665-11ee-9e3e-f968222332ec
+
+
+
diff --git a/graph/incidents_graphml/c/c52dbbc0-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c52dbbc0-8de5-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1e898c502dd684a1d669b291e5de9e9023858d2
--- /dev/null
+++ b/graph/incidents_graphml/c/c52dbbc0-8de5-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.118
+ 100.64.64.118
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701172849
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c52dbbc0-8de5-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/c53aa210-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c53aa210-1228-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9e9b0cb1f1c9e7ef1b4049b3f4b4e78bc6babee
--- /dev/null
+++ b/graph/incidents_graphml/c/c53aa210-1228-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.217
+ 100.64.80.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687567681
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c53aa210-1228-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/c/c53d4c20-8de5-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c53d4c20-8de5-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6649bb8f7724856adc08c99516885c320d8b9bb
--- /dev/null
+++ b/graph/incidents_graphml/c/c53d4c20-8de5-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.118
+ 100.64.64.118
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701172849
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c53d4c20-8de5-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/c5538890-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c5538890-3517-11ee-8486-31c54e05c523.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bee620f837f7f8a2db1f633af7709f1e76fea988
--- /dev/null
+++ b/graph/incidents_graphml/c/c5538890-3517-11ee-8486-31c54e05c523.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.169
+ 100.64.22.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408670
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c5538890-3517-11ee-8486-31c54e05c523
+
+
+
diff --git a/graph/incidents_graphml/c/c55a8620-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c55a8620-1228-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58c4b2663304cd218b2ec644aec23aad647aca5a
--- /dev/null
+++ b/graph/incidents_graphml/c/c55a8620-1228-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.217
+ 100.64.80.217
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687567681
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c55a8620-1228-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/c/c562f7d0-0e89-11ee-9188-256b81e0b008.graphml b/graph/incidents_graphml/c/c562f7d0-0e89-11ee-9188-256b81e0b008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0675fe4a5379361bd018402a79be875804e6322
--- /dev/null
+++ b/graph/incidents_graphml/c/c562f7d0-0e89-11ee-9188-256b81e0b008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.188
+ 100.64.38.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687169538
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c562f7d0-0e89-11ee-9188-256b81e0b008
+
+
+
diff --git a/graph/incidents_graphml/c/c5692d60-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/c/c5692d60-be7c-11ed-9564-3d773f19984f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..436999b83e7194069189778831febb98429f3523
--- /dev/null
+++ b/graph/incidents_graphml/c/c5692d60-be7c-11ed-9564-3d773f19984f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.2
+ 100.64.97.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678367861
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5692d60-be7c-11ed-9564-3d773f19984f
+
+
+
diff --git a/graph/incidents_graphml/c/c56c88c0-be7c-11ed-9564-3d773f19984f.graphml b/graph/incidents_graphml/c/c56c88c0-be7c-11ed-9564-3d773f19984f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c448e1555c93e51bbb001b2050228b29dfc0d5b
--- /dev/null
+++ b/graph/incidents_graphml/c/c56c88c0-be7c-11ed-9564-3d773f19984f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.2
+ 100.64.97.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678367861
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c56c88c0-be7c-11ed-9564-3d773f19984f
+
+
+
diff --git a/graph/incidents_graphml/c/c5762bc0-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c5762bc0-3517-11ee-8486-31c54e05c523.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4637b2f5d4f4562eab400a5d9139dc610409a4f4
--- /dev/null
+++ b/graph/incidents_graphml/c/c5762bc0-3517-11ee-8486-31c54e05c523.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.169
+ 100.64.22.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408671
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c5762bc0-3517-11ee-8486-31c54e05c523
+
+
+
diff --git a/graph/incidents_graphml/c/c576e470-1fe1-11ee-80ac-1985e110d782.graphml b/graph/incidents_graphml/c/c576e470-1fe1-11ee-80ac-1985e110d782.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..860eed79ba89f185947edb4cf37eebc088428a0a
--- /dev/null
+++ b/graph/incidents_graphml/c/c576e470-1fe1-11ee-80ac-1985e110d782.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.48
+ 100.64.57.48
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689076503
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c576e470-1fe1-11ee-80ac-1985e110d782
+
+
+
diff --git a/graph/incidents_graphml/c/c578c650-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c578c650-8454-11ee-ad04-df7d06c31c2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af1b780ca464dcf4e112f00386c02b858aab85e3
--- /dev/null
+++ b/graph/incidents_graphml/c/c578c650-8454-11ee-ad04-df7d06c31c2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.181
+ 100.64.33.181
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700121012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c578c650-8454-11ee-ad04-df7d06c31c2e
+
+
+
diff --git a/graph/incidents_graphml/c/c5799290-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/c/c5799290-ab6c-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ab9c48414440616cd95532c30061ee810104557
--- /dev/null
+++ b/graph/incidents_graphml/c/c5799290-ab6c-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.121
+ 100.64.32.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1676271917
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5799290-ab6c-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/c/c57d0920-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c57d0920-6665-11ee-9e3e-f968222332ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d0865e1d0adbf2c2d783e2f18a21aa26a971229
--- /dev/null
+++ b/graph/incidents_graphml/c/c57d0920-6665-11ee-9e3e-f968222332ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.153
+ 100.64.57.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696829778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c57d0920-6665-11ee-9e3e-f968222332ec
+
+
+
diff --git a/graph/incidents_graphml/c/c57f10d0-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/c/c57f10d0-ab6c-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94da928a85f89079929af051dd28a45bf616a21d
--- /dev/null
+++ b/graph/incidents_graphml/c/c57f10d0-ab6c-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.32.121
+ 100.64.32.121
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676271917
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c57f10d0-ab6c-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/c/c585dcb0-0d16-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/c/c585dcb0-0d16-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cb35d97c9c5ef89e6bcff275b2beedad0930df2
--- /dev/null
+++ b/graph/incidents_graphml/c/c585dcb0-0d16-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.178
+ 100.64.72.178
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.46.36
+ 100.64.46.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687010195
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c585dcb0-0d16-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687010195
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c585dcb0-0d16-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/c/c58bd920-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c58bd920-8454-11ee-ad04-df7d06c31c2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06119aed81a0d870e7792140370387ba67ca00cd
--- /dev/null
+++ b/graph/incidents_graphml/c/c58bd920-8454-11ee-ad04-df7d06c31c2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.181
+ 100.64.33.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700121012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c58bd920-8454-11ee-ad04-df7d06c31c2e
+
+
+
diff --git a/graph/incidents_graphml/c/c58ca390-95ae-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/c/c58ca390-95ae-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..932e295455613866a8027321b8c4dfaff40fa0a0
--- /dev/null
+++ b/graph/incidents_graphml/c/c58ca390-95ae-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.172
+ 100.64.28.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.240
+ 100.64.71.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1673881338
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c58ca390-95ae-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673881338
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c58ca390-95ae-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/c/c5909ec0-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/c5909ec0-2607-11ee-ad88-fb76ca0617eb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98bc7473ec0905cd90e9124377a63b07221983c7
--- /dev/null
+++ b/graph/incidents_graphml/c/c5909ec0-2607-11ee-ad88-fb76ca0617eb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.109
+ 100.64.7.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689752531
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5909ec0-2607-11ee-ad88-fb76ca0617eb
+
+
+
diff --git a/graph/incidents_graphml/c/c5914500-789b-11ee-8d62-1fa49ad9521f.graphml b/graph/incidents_graphml/c/c5914500-789b-11ee-8d62-1fa49ad9521f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1919b96d9baa4b7675cba8e1bf88729797619358
--- /dev/null
+++ b/graph/incidents_graphml/c/c5914500-789b-11ee-8d62-1fa49ad9521f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.146
+ 100.64.30.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698832092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5914500-789b-11ee-8d62-1fa49ad9521f
+
+
+
diff --git a/graph/incidents_graphml/c/c594d6e0-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c594d6e0-6665-11ee-9e3e-f968222332ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..75bbdc238aede3e5190167a690429635807e6813
--- /dev/null
+++ b/graph/incidents_graphml/c/c594d6e0-6665-11ee-9e3e-f968222332ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.153
+ 100.64.57.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696829778
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c594d6e0-6665-11ee-9e3e-f968222332ec
+
+
+
diff --git a/graph/incidents_graphml/c/c597fc70-8d7b-11ee-94d2-bbe9f432e5f6.graphml b/graph/incidents_graphml/c/c597fc70-8d7b-11ee-94d2-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2ec1621bd499e2b1db88e25df1e77fb469c9f66
--- /dev/null
+++ b/graph/incidents_graphml/c/c597fc70-8d7b-11ee-94d2-bbe9f432e5f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.149
+ 100.64.56.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701127323
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c597fc70-8d7b-11ee-94d2-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/c/c59a7f20-8454-11ee-ad04-df7d06c31c2e.graphml b/graph/incidents_graphml/c/c59a7f20-8454-11ee-ad04-df7d06c31c2e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24bcf990a574548489b09fe45fe10d90ba863ae4
--- /dev/null
+++ b/graph/incidents_graphml/c/c59a7f20-8454-11ee-ad04-df7d06c31c2e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.183
+ 100.64.33.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700121012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c59a7f20-8454-11ee-ad04-df7d06c31c2e
+
+
+
diff --git a/graph/incidents_graphml/c/c59c5160-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c59c5160-3517-11ee-8486-31c54e05c523.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d6eec1149800333b796f5ace3151e78879a234c
--- /dev/null
+++ b/graph/incidents_graphml/c/c59c5160-3517-11ee-8486-31c54e05c523.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.197
+ 100.64.22.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408671
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c59c5160-3517-11ee-8486-31c54e05c523
+
+
+
diff --git a/graph/incidents_graphml/c/c5a274d0-182c-11ee-b591-f5bec484f8bc.graphml b/graph/incidents_graphml/c/c5a274d0-182c-11ee-b591-f5bec484f8bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e1a5997f561c65bd19854edd1e9054e1f583248
--- /dev/null
+++ b/graph/incidents_graphml/c/c5a274d0-182c-11ee-b591-f5bec484f8bc.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.80
+ 100.64.73.80
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.81
+ 100.64.73.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.82
+ 100.64.73.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.22.68
+ USER-0015-1652.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.3.153
+ 100.64.3.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.83
+ 100.64.73.83
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.7.183
+ 100.64.7.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.84
+ 100.64.73.84
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+ INCIDENT_LINK
+ 1688229106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a274d0-182c-11ee-b591-f5bec484f8bc
+
+
+
diff --git a/graph/incidents_graphml/c/c5a32ec0-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c5a32ec0-6665-11ee-9e3e-f968222332ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0c739f39f9cc8464f7a52caccbe587fd8bbf146
--- /dev/null
+++ b/graph/incidents_graphml/c/c5a32ec0-6665-11ee-9e3e-f968222332ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.161
+ 100.64.15.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696829778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c5a32ec0-6665-11ee-9e3e-f968222332ec
+
+
+
diff --git a/graph/incidents_graphml/c/c5a35e70-305b-11ef-89a2-c78d159172f4.graphml b/graph/incidents_graphml/c/c5a35e70-305b-11ef-89a2-c78d159172f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd50aa1d821125404fa6cc74ee4c3802acf44780
--- /dev/null
+++ b/graph/incidents_graphml/c/c5a35e70-305b-11ef-89a2-c78d159172f4.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.48
+ 100.64.15.48
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.49
+ 100.64.15.49
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.50
+ 100.64.15.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.51
+ 100.64.15.51
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.52
+ 100.64.15.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.53
+ 100.64.15.53
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.54
+ 100.64.15.54
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.55
+ 100.64.15.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+ INCIDENT_LINK
+ 1719035618
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c5a35e70-305b-11ef-89a2-c78d159172f4
+
+
+
diff --git a/graph/incidents_graphml/c/c5a91b50-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c5a91b50-1228-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59ed7ac6fedb20daeb5d4dd5adc00e28f5263ed2
--- /dev/null
+++ b/graph/incidents_graphml/c/c5a91b50-1228-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.220
+ 100.64.80.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c5a91b50-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c5a91b50-1228-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/c/c5b09c40-6665-11ee-9e3e-f968222332ec.graphml b/graph/incidents_graphml/c/c5b09c40-6665-11ee-9e3e-f968222332ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5854ed63441168b09d8bfa2fdb23a2aeda4d0160
--- /dev/null
+++ b/graph/incidents_graphml/c/c5b09c40-6665-11ee-9e3e-f968222332ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.161
+ 100.64.15.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696829779
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c5b09c40-6665-11ee-9e3e-f968222332ec
+
+
+
diff --git a/graph/incidents_graphml/c/c5b4e4e0-fa48-11ee-a230-bfe539a81cf2.graphml b/graph/incidents_graphml/c/c5b4e4e0-fa48-11ee-a230-bfe539a81cf2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77bc447a35d9ab64f56585026ad0440002772cdb
--- /dev/null
+++ b/graph/incidents_graphml/c/c5b4e4e0-fa48-11ee-a230-bfe539a81cf2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.128
+ 100.64.41.128
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713090095
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c5b4e4e0-fa48-11ee-a230-bfe539a81cf2
+
+
+
diff --git a/graph/incidents_graphml/c/c5bb0a20-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/c5bb0a20-2607-11ee-ad88-fb76ca0617eb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..646e1098f2b71295c323ace03b2b84dd30de655f
--- /dev/null
+++ b/graph/incidents_graphml/c/c5bb0a20-2607-11ee-ad88-fb76ca0617eb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.36
+ 100.64.30.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689752532
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c5bb0a20-2607-11ee-ad88-fb76ca0617eb
+
+
+
diff --git a/graph/incidents_graphml/c/c5bdeb80-3027-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/c/c5bdeb80-3027-11ee-a433-a916fb2bb25a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8b29be7b9045cdfd9760e5fa594ebac30f73bd1
--- /dev/null
+++ b/graph/incidents_graphml/c/c5bdeb80-3027-11ee-a433-a916fb2bb25a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.10
+ 100.64.37.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690865787
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5bdeb80-3027-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865787
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5bdeb80-3027-11ee-a433-a916fb2bb25a
+
+
+
diff --git a/graph/incidents_graphml/c/c5c93f20-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c5c93f20-7902-11ee-aeda-45f788b28e25.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e155212fbb9e26c4b3448b57d45978b3fe0253e
--- /dev/null
+++ b/graph/incidents_graphml/c/c5c93f20-7902-11ee-aeda-45f788b28e25.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.243
+ 100.64.11.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698876331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5c93f20-7902-11ee-aeda-45f788b28e25
+
+
+
diff --git a/graph/incidents_graphml/c/c5cb9ec0-3517-11ee-8486-31c54e05c523.graphml b/graph/incidents_graphml/c/c5cb9ec0-3517-11ee-8486-31c54e05c523.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eeb2c6ce14359e910de5c1910362d26ab3154e5a
--- /dev/null
+++ b/graph/incidents_graphml/c/c5cb9ec0-3517-11ee-8486-31c54e05c523.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.197
+ 100.64.22.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408671
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c5cb9ec0-3517-11ee-8486-31c54e05c523
+
+
+
diff --git a/graph/incidents_graphml/c/c5d17850-2607-11ee-ad88-fb76ca0617eb.graphml b/graph/incidents_graphml/c/c5d17850-2607-11ee-ad88-fb76ca0617eb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a20211f25568b033032524c425adf3cfaa792cb
--- /dev/null
+++ b/graph/incidents_graphml/c/c5d17850-2607-11ee-ad88-fb76ca0617eb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.176
+ 100.64.61.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689752532
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5d17850-2607-11ee-ad88-fb76ca0617eb
+
+
+
diff --git a/graph/incidents_graphml/c/c5d8f690-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c5d8f690-7902-11ee-aeda-45f788b28e25.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99c8f65057c8921be780eb87963f8f6028bca479
--- /dev/null
+++ b/graph/incidents_graphml/c/c5d8f690-7902-11ee-aeda-45f788b28e25.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698876331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c5d8f690-7902-11ee-aeda-45f788b28e25
+
+
+
diff --git a/graph/incidents_graphml/c/c5e26c30-ebae-11ec-9bb1-995ea4635eee.graphml b/graph/incidents_graphml/c/c5e26c30-ebae-11ec-9bb1-995ea4635eee.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70561ad0bb63db4d96f793a9314a18e79b0d8b1b
--- /dev/null
+++ b/graph/incidents_graphml/c/c5e26c30-ebae-11ec-9bb1-995ea4635eee.graphml
@@ -0,0 +1,755 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.166
+ 100.64.3.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.67
+ 100.64.72.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.157
+ USER-0015-1738.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.114
+ 100.64.74.114
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.62.69
+ 100.64.62.69
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.158
+ 100.64.76.158
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.158
+ USER-0015-1647.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.23.49
+ 100.64.23.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.31
+ 100.64.75.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.58
+ USER-0015-1739.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.159
+ 100.64.76.159
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.196
+ 100.64.72.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.160
+ HOST-14167
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.161
+ 100.64.76.161
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.162
+ 100.64.76.162
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.37
+ USER-0015-1666.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.163
+ 100.64.76.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.33
+ USER-0015-1618.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.164
+ 100.64.76.164
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.165
+ 100.64.76.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.82
+ 100.64.71.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+ INCIDENT_LINK
+ 1655189641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e26c30-ebae-11ec-9bb1-995ea4635eee
+
+
+
diff --git a/graph/incidents_graphml/c/c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf.graphml b/graph/incidents_graphml/c/c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b960bb1e096e978ba4816fc194bce397500a36eb
--- /dev/null
+++ b/graph/incidents_graphml/c/c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.153
+ 100.64.94.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.10.38
+ 100.64.10.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.154
+ USER-0015-2119.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.155
+ 100.64.94.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.156
+ 100.64.94.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714983317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e2f6c0-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+
diff --git a/graph/incidents_graphml/c/c5e3c610-6769-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/c/c5e3c610-6769-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8941fe08708a046499a27cbac539fa8ba5a5f4d0
--- /dev/null
+++ b/graph/incidents_graphml/c/c5e3c610-6769-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.5
+ 100.64.34.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696941448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c5e3c610-6769-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/c/c5e580e0-93b5-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/c/c5e580e0-93b5-11ee-ad07-e3190f846a2a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..322538ad6c4e1834d5184cfe008f5250ca5c9432
--- /dev/null
+++ b/graph/incidents_graphml/c/c5e580e0-93b5-11ee-ad07-e3190f846a2a.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.248
+ 100.64.68.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB","Azure Security"]
+
+
+ HOST
+ 100.64.13.187
+ 100.64.13.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.8.84
+ 100.64.8.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1701811941
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e580e0-93b5-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701811941
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e580e0-93b5-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701811941
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e580e0-93b5-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701811941
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e580e0-93b5-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701811941
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e580e0-93b5-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701811941
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c5e580e0-93b5-11ee-ad07-e3190f846a2a
+
+
+
diff --git a/graph/incidents_graphml/c/c6043d20-8a99-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/c/c6043d20-8a99-11ee-b145-63bb68632209.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..415b4cc2c180e0000c9e8d2964ea282336152910
--- /dev/null
+++ b/graph/incidents_graphml/c/c6043d20-8a99-11ee-b145-63bb68632209.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.42
+ 100.64.41.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700810355
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6043d20-8a99-11ee-b145-63bb68632209
+
+
+
diff --git a/graph/incidents_graphml/c/c6054750-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/c/c6054750-2ebf-11ee-9131-1117bdeaaaa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85c5fee41598e989a1b8f9e639cf152a97a71594
--- /dev/null
+++ b/graph/incidents_graphml/c/c6054750-2ebf-11ee-9131-1117bdeaaaa3.graphml
@@ -0,0 +1,437 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.118
+ 100.64.72.118
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.119
+ 100.64.72.119
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.120
+ 100.64.72.120
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.121
+ 100.64.72.121
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.28.45
+ 100.64.28.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.68359375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.122
+ 100.64.72.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.123
+ 100.64.72.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.16.144
+ 100.64.16.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.124
+ 100.64.72.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.237
+ 100.64.71.237
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.37.146
+ 100.64.37.146
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.63.7
+ 100.64.63.7
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6054750-2ebf-11ee-9131-1117bdeaaaa3
+
+
+
diff --git a/graph/incidents_graphml/c/c6059e20-6093-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/c/c6059e20-6093-11ee-a31b-270f2d0ccd3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7901f9e72aae881c006b1397cab609c596059ba
--- /dev/null
+++ b/graph/incidents_graphml/c/c6059e20-6093-11ee-a31b-270f2d0ccd3d.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.203
+ 100.64.23.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.29
+ 100.64.69.29
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.33.167
+ 100.64.33.167
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.21.121
+ 100.64.21.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.30
+ 100.64.69.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.31
+ 100.64.69.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.32
+ 100.64.69.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.33
+ 100.64.69.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.29.177
+ 100.64.29.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6059e20-6093-11ee-a31b-270f2d0ccd3d
+
+
+
diff --git a/graph/incidents_graphml/c/c6063a60-6093-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/c/c6063a60-6093-11ee-a31b-270f2d0ccd3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d47d817774b6605b67e4ab6aa10a84d59847248a
--- /dev/null
+++ b/graph/incidents_graphml/c/c6063a60-6093-11ee-a31b-270f2d0ccd3d.graphml
@@ -0,0 +1,637 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.34
+ 100.64.69.34
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.35
+ 100.64.69.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.15.132
+ 100.64.15.132
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.12.61
+ 100.64.12.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.36
+ 100.64.69.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.81015625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.40.143
+ 100.64.40.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.249
+ 100.64.18.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.30.126
+ 100.64.30.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.30.36
+ 100.64.30.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.37
+ 100.64.69.37
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.22.167
+ 100.64.22.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.119
+ 100.64.11.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189829
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ c6063a60-6093-11ee-a31b-270f2d0ccd3d
+
+
+
diff --git a/graph/incidents_graphml/c/c60c22e0-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c60c22e0-1228-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e48d7d15b1bb61f3a9ca99e6a605899896a51c1d
--- /dev/null
+++ b/graph/incidents_graphml/c/c60c22e0-1228-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,791 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.1
+ 100.64.74.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.221
+ 100.64.74.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.156
+ 100.64.72.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.29.5
+ 100.64.29.5
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.159
+ HOST-14709
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.12.88
+ 100.64.12.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.240
+ 100.64.71.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.149
+ 100.64.71.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.18.1
+ 100.64.18.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.82
+ 100.64.73.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.33.70
+ 100.64.33.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.99
+ 100.64.11.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.44.155
+ 100.64.44.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.31.2
+ 100.64.31.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.37.38
+ 100.64.37.38
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.35.196
+ 100.64.35.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.250
+ 100.64.73.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.6.187
+ USER-0015-1421.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.200
+ 100.64.73.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.72
+ 100.64.74.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.225
+ 100.64.80.225
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.177
+ 100.64.75.177
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c60c22e0-1228-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/c/c60c2a10-df14-11ee-9778-4184b1db151c.graphml b/graph/incidents_graphml/c/c60c2a10-df14-11ee-9778-4184b1db151c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfbc2e2330012df6157d13777b62ff19c3452da7
--- /dev/null
+++ b/graph/incidents_graphml/c/c60c2a10-df14-11ee-9778-4184b1db151c.graphml
@@ -0,0 +1,99 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.29
+ 100.64.10.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.30
+ 100.64.10.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710099081
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c60c2a10-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099081
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c60c2a10-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099081
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c60c2a10-df14-11ee-9778-4184b1db151c
+
+
+
diff --git a/graph/incidents_graphml/c/c60f3130-fbb9-11ee-947f-6184d270644d.graphml b/graph/incidents_graphml/c/c60f3130-fbb9-11ee-947f-6184d270644d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c5a7ed6a7c8b41062efecaad5747619bc167ca5
--- /dev/null
+++ b/graph/incidents_graphml/c/c60f3130-fbb9-11ee-947f-6184d270644d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.12
+ 100.64.65.12
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713248580
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c60f3130-fbb9-11ee-947f-6184d270644d
+
+
+
diff --git a/graph/incidents_graphml/c/c618d040-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/c/c618d040-d30b-11ee-ab07-630a66777c1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e48ef7338615f744e5a08e34a7fc6db9e990009
--- /dev/null
+++ b/graph/incidents_graphml/c/c618d040-d30b-11ee-ab07-630a66777c1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.180
+ 100.64.38.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708775801
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c618d040-d30b-11ee-ab07-630a66777c1a
+
+
+
diff --git a/graph/incidents_graphml/c/c619f970-0858-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/c/c619f970-0858-11ef-81c9-bbab78bb4e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe86476283e2438fee71cea01613c4dc29bbdff2
--- /dev/null
+++ b/graph/incidents_graphml/c/c619f970-0858-11ef-81c9-bbab78bb4e36.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.186.190
+ 172.31.186.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.97.183
+ 100.64.97.183
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714636284
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c619f970-0858-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636284
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c619f970-0858-11ef-81c9-bbab78bb4e36
+
+
+
diff --git a/graph/incidents_graphml/c/c61b3e10-1228-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/c/c61b3e10-1228-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b184444255899b80c8f4afa3a684dd94ed2d7ce7
--- /dev/null
+++ b/graph/incidents_graphml/c/c61b3e10-1228-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.226
+ 100.64.80.226
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687567682
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c61b3e10-1228-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/c/c62c3130-d30b-11ee-ab07-630a66777c1a.graphml b/graph/incidents_graphml/c/c62c3130-d30b-11ee-ab07-630a66777c1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2686cc067e275622fc41a3c9312c97062c2effc5
--- /dev/null
+++ b/graph/incidents_graphml/c/c62c3130-d30b-11ee-ab07-630a66777c1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.180
+ 100.64.38.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708775801
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c62c3130-d30b-11ee-ab07-630a66777c1a
+
+
+
diff --git a/graph/incidents_graphml/c/c62d7760-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c62d7760-6386-11ee-9eed-775092596c34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfd6c526023fd23fab26ba827758bed5397c9408
--- /dev/null
+++ b/graph/incidents_graphml/c/c62d7760-6386-11ee-9eed-775092596c34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.161
+ 100.64.9.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696514099
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c62d7760-6386-11ee-9eed-775092596c34
+
+
+
diff --git a/graph/incidents_graphml/c/c62fd1c0-0ad1-11ef-8694-dbcc61061be0.graphml b/graph/incidents_graphml/c/c62fd1c0-0ad1-11ef-8694-dbcc61061be0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c3b9e9292723a9f19db2f2dabcd95382d7c30199
--- /dev/null
+++ b/graph/incidents_graphml/c/c62fd1c0-0ad1-11ef-8694-dbcc61061be0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.140
+ 100.64.15.140
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714908156
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c62fd1c0-0ad1-11ef-8694-dbcc61061be0
+
+
+
diff --git a/graph/incidents_graphml/c/c632b480-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/c/c632b480-210c-11ee-ab17-9db2be59825a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c25e442f22f086b0e65b8f354fb118ad753dba6
--- /dev/null
+++ b/graph/incidents_graphml/c/c632b480-210c-11ee-ab17-9db2be59825a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.83
+ USER-0015-1218.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689204924
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c632b480-210c-11ee-ab17-9db2be59825a
+
+
+
diff --git a/graph/incidents_graphml/c/c6382d90-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c6382d90-7902-11ee-aeda-45f788b28e25.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a2d7df389b7160864cd0ba6288e34ed597f9f94d
--- /dev/null
+++ b/graph/incidents_graphml/c/c6382d90-7902-11ee-aeda-45f788b28e25.graphml
@@ -0,0 +1,151 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.172
+ 100.64.24.172
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698876331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6382d90-7902-11ee-aeda-45f788b28e25
+
+
+ INCIDENT_LINK
+ 1698876331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6382d90-7902-11ee-aeda-45f788b28e25
+
+
+ INCIDENT_LINK
+ 1698876331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6382d90-7902-11ee-aeda-45f788b28e25
+
+
+ INCIDENT_LINK
+ 1698876331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6382d90-7902-11ee-aeda-45f788b28e25
+
+
+ INCIDENT_LINK
+ 1698876331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c6382d90-7902-11ee-aeda-45f788b28e25
+
+
+
diff --git a/graph/incidents_graphml/c/c63c8a60-ee30-11ec-9c18-c95a461c6308.graphml b/graph/incidents_graphml/c/c63c8a60-ee30-11ec-9c18-c95a461c6308.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55dbc49ac6510871bb861516dbca3c6c76437114
--- /dev/null
+++ b/graph/incidents_graphml/c/c63c8a60-ee30-11ec-9c18-c95a461c6308.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.86
+ 100.64.76.86
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.114
+ 100.64.74.114
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655465379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c63c8a60-ee30-11ec-9c18-c95a461c6308
+
+
+ INCIDENT_LINK
+ 1655465379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c63c8a60-ee30-11ec-9c18-c95a461c6308
+
+
+
diff --git a/graph/incidents_graphml/c/c6408a30-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c6408a30-6386-11ee-9eed-775092596c34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bbfa969b7ff7489569c656f3b556c97ec7bbef3b
--- /dev/null
+++ b/graph/incidents_graphml/c/c6408a30-6386-11ee-9eed-775092596c34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.161
+ 100.64.9.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696514099
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6408a30-6386-11ee-9eed-775092596c34
+
+
+
diff --git a/graph/incidents_graphml/c/c6418500-0ad1-11ef-8694-dbcc61061be0.graphml b/graph/incidents_graphml/c/c6418500-0ad1-11ef-8694-dbcc61061be0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa160afc45b5e4115e5a4e40306278f79d46b216
--- /dev/null
+++ b/graph/incidents_graphml/c/c6418500-0ad1-11ef-8694-dbcc61061be0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.140
+ 100.64.15.140
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714908156
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6418500-0ad1-11ef-8694-dbcc61061be0
+
+
+
diff --git a/graph/incidents_graphml/c/c647bdf0-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c647bdf0-7902-11ee-aeda-45f788b28e25.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..760e61fce4c42e143603700dd6df2f09ef41a32b
--- /dev/null
+++ b/graph/incidents_graphml/c/c647bdf0-7902-11ee-aeda-45f788b28e25.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.172
+ 100.64.24.172
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698876331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c647bdf0-7902-11ee-aeda-45f788b28e25
+
+
+
diff --git a/graph/incidents_graphml/c/c64b8390-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c64b8390-73d5-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9f266692c1ed9badaa455f4282b1525bd1cb3b6
--- /dev/null
+++ b/graph/incidents_graphml/c/c64b8390-73d5-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.18
+ 100.64.67.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698307248
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c64b8390-73d5-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/c/c64c4a00-6386-11ee-9eed-775092596c34.graphml b/graph/incidents_graphml/c/c64c4a00-6386-11ee-9eed-775092596c34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48c90f4422eefa209ef4824983109b028f3a88ba
--- /dev/null
+++ b/graph/incidents_graphml/c/c64c4a00-6386-11ee-9eed-775092596c34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.230
+ 100.64.51.230
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696514099
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c64c4a00-6386-11ee-9eed-775092596c34
+
+
+
diff --git a/graph/incidents_graphml/c/c64f40a0-0ad1-11ef-8694-dbcc61061be0.graphml b/graph/incidents_graphml/c/c64f40a0-0ad1-11ef-8694-dbcc61061be0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..47ae63d477f2fa800b5c3e049e13414033302c7c
--- /dev/null
+++ b/graph/incidents_graphml/c/c64f40a0-0ad1-11ef-8694-dbcc61061be0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.21
+ 100.64.3.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714908156
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c64f40a0-0ad1-11ef-8694-dbcc61061be0
+
+
+
diff --git a/graph/incidents_graphml/c/c655f3f0-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/c/c655f3f0-210c-11ee-ab17-9db2be59825a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94245cc4491895300aeb208c81efcbef74486596
--- /dev/null
+++ b/graph/incidents_graphml/c/c655f3f0-210c-11ee-ab17-9db2be59825a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.83
+ USER-0015-1218.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689204924
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c655f3f0-210c-11ee-ab17-9db2be59825a
+
+
+
diff --git a/graph/incidents_graphml/c/c6570030-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c6570030-7902-11ee-aeda-45f788b28e25.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b4521df71abc5e7afcb0f01dac72f7b9dcacfca
--- /dev/null
+++ b/graph/incidents_graphml/c/c6570030-7902-11ee-aeda-45f788b28e25.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.174
+ 100.64.24.174
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698876332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c6570030-7902-11ee-aeda-45f788b28e25
+
+
+
diff --git a/graph/incidents_graphml/c/c65dfa20-73d5-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/c/c65dfa20-73d5-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d29e7969ae1937e2f6a8f016fde3e4ad05dc1ae
--- /dev/null
+++ b/graph/incidents_graphml/c/c65dfa20-73d5-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.18
+ 100.64.67.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698307248
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c65dfa20-73d5-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/c/c6655810-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c6655810-7902-11ee-aeda-45f788b28e25.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09c759aa7790a78548e0b63a34e89eca31f94532
--- /dev/null
+++ b/graph/incidents_graphml/c/c6655810-7902-11ee-aeda-45f788b28e25.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.174
+ 100.64.24.174
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698876332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c6655810-7902-11ee-aeda-45f788b28e25
+
+
+
diff --git a/graph/incidents_graphml/c/c66d0060-93b5-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/c/c66d0060-93b5-11ee-ad07-e3190f846a2a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52c6c09b0b05a5d33e204799fe5adbea9e4ce661
--- /dev/null
+++ b/graph/incidents_graphml/c/c66d0060-93b5-11ee-ad07-e3190f846a2a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.77
+ 100.64.69.77
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1701811942
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c66d0060-93b5-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701811942
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c66d0060-93b5-11ee-ad07-e3190f846a2a
+
+
+
diff --git a/graph/incidents_graphml/c/c6727770-1007-11ee-af9c-772eadfde881.graphml b/graph/incidents_graphml/c/c6727770-1007-11ee-af9c-772eadfde881.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c75fde0590bfe8bcc09a0c054f042860513773e
--- /dev/null
+++ b/graph/incidents_graphml/c/c6727770-1007-11ee-af9c-772eadfde881.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.88
+ USER-0015-1473.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687333607
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6727770-1007-11ee-af9c-772eadfde881
+
+
+
diff --git a/graph/incidents_graphml/c/c673fe10-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c673fe10-7902-11ee-aeda-45f788b28e25.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1676da557587e591dcddbbe12490fc631da8b39
--- /dev/null
+++ b/graph/incidents_graphml/c/c673fe10-7902-11ee-aeda-45f788b28e25.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.174
+ 100.64.13.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698876332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c673fe10-7902-11ee-aeda-45f788b28e25
+
+
+
diff --git a/graph/incidents_graphml/c/c6798180-210c-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/c/c6798180-210c-11ee-ab17-9db2be59825a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..358980b4aa0a7145a104426b6606c157884fd748
--- /dev/null
+++ b/graph/incidents_graphml/c/c6798180-210c-11ee-ab17-9db2be59825a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.62
+ 100.64.22.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689204925
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ c6798180-210c-11ee-ab17-9db2be59825a
+
+
+
diff --git a/graph/incidents_graphml/c/c67cb170-2d7c-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/c/c67cb170-2d7c-11ef-88d9-1fb9581a602f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5fbc7256af628b00631b9bdb9086a29464690f6
--- /dev/null
+++ b/graph/incidents_graphml/c/c67cb170-2d7c-11ef-88d9-1fb9581a602f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.248.123
+ USER-0015-2106.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.205
+ 100.64.93.205
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718719940
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c67cb170-2d7c-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719940
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c67cb170-2d7c-11ef-88d9-1fb9581a602f
+
+
+
diff --git a/graph/incidents_graphml/c/c680c970-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c680c970-ab01-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72d775e96e8c8d1f654f325d5a341d78db1057c3
--- /dev/null
+++ b/graph/incidents_graphml/c/c680c970-ab01-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.138
+ 100.64.26.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1704373460
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c680c970-ab01-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/c/c6839060-10b5-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/c/c6839060-10b5-11ee-aed8-b565505929b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8aa42c07e8d363c37981bba3889b9dcca5bd89ee
--- /dev/null
+++ b/graph/incidents_graphml/c/c6839060-10b5-11ee-aed8-b565505929b5.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.159
+ 100.64.9.159
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.60
+ 100.64.68.60
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1687408340
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6839060-10b5-11ee-aed8-b565505929b5
+
+
+ INCIDENT_LINK
+ 1687408340
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6839060-10b5-11ee-aed8-b565505929b5
+
+
+ INCIDENT_LINK
+ 1687408340
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6839060-10b5-11ee-aed8-b565505929b5
+
+
+ INCIDENT_LINK
+ 1687408340
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c6839060-10b5-11ee-aed8-b565505929b5
+
+
+
diff --git a/graph/incidents_graphml/c/c68aba60-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c68aba60-7902-11ee-aeda-45f788b28e25.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a3f3d46be5718931e1da19c81090cdbe0b93f42
--- /dev/null
+++ b/graph/incidents_graphml/c/c68aba60-7902-11ee-aeda-45f788b28e25.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.174
+ 100.64.13.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698876332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ c68aba60-7902-11ee-aeda-45f788b28e25
+
+
+
diff --git a/graph/incidents_graphml/c/c68f5610-8c0d-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/c/c68f5610-8c0d-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7142e464f997fcf720adb20eb5bec90956315a4a
--- /dev/null
+++ b/graph/incidents_graphml/c/c68f5610-8c0d-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.190
+ 100.64.16.190
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700970129
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ c68f5610-8c0d-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/c/c695b100-ab01-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/c/c695b100-ab01-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af9e1236d91bbcc9bc113e648be1cd15bce47851
--- /dev/null
+++ b/graph/incidents_graphml/c/c695b100-ab01-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.26.138
+ 100.64.26.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704373461
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c695b100-ab01-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/c/c69cbbc0-7902-11ee-aeda-45f788b28e25.graphml b/graph/incidents_graphml/c/c69cbbc0-7902-11ee-aeda-45f788b28e25.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5cad0123797abe5c30d7d71eacd813496bd9c592
--- /dev/null
+++ b/graph/incidents_graphml/c/c69cbbc0-7902-11ee-aeda-45f788b28e25.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.174
+ 100.64.13.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698876332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ c69cbbc0-7902-11ee-aeda-45f788b28e25
+
+
+