f15hb0wn commited on
Commit
e91064b
·
verified ·
1 Parent(s): dcac60c

Upload per-incident GraphML sharded batch 21/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/c/c69d0810-0e2a-11ef-801a-2fb46581ffa8.graphml +63 -0
  2. graph/incidents_graphml/c/c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1.graphml +63 -0
  3. graph/incidents_graphml/c/c6a8e1d0-fa48-11ee-a230-bfe539a81cf2.graphml +63 -0
  4. graph/incidents_graphml/c/c6acf940-26cd-11ee-863d-83828757c718.graphml +149 -0
  5. graph/incidents_graphml/c/c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d.graphml +63 -0
  6. graph/incidents_graphml/c/c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1.graphml +63 -0
  7. graph/incidents_graphml/c/c6bf3610-0e2a-11ef-801a-2fb46581ffa8.graphml +63 -0
  8. graph/incidents_graphml/c/c6dc4d70-1c97-11ee-b9c1-8f183b2e0424.graphml +77 -0
  9. graph/incidents_graphml/c/c6f1c230-0ad1-11ef-8694-dbcc61061be0.graphml +63 -0
  10. graph/incidents_graphml/c/c6f1f850-1c97-11ee-b9c1-8f183b2e0424.graphml +149 -0
  11. graph/incidents_graphml/c/c6f59170-1a8c-11ee-a9ef-735ae64b5bd4.graphml +77 -0
  12. graph/incidents_graphml/c/c6f8acf0-df14-11ee-9778-4184b1db151c.graphml +785 -0
  13. graph/incidents_graphml/c/c6fa8d40-ab6c-11ed-b288-05f5e2790b36.graphml +63 -0
  14. graph/incidents_graphml/c/c6ff4830-ab6c-11ed-b288-05f5e2790b36.graphml +63 -0
  15. graph/incidents_graphml/c/c7167d60-ddd0-11ee-a342-9d44f1915d3d.graphml +63 -0
  16. graph/incidents_graphml/c/c721b500-0cab-11ee-8985-55bb832fcc7f.graphml +63 -0
  17. graph/incidents_graphml/c/c72f7f50-ed53-11ec-8964-796320a841f1.graphml +77 -0
  18. graph/incidents_graphml/c/c7374510-3027-11ee-a433-a916fb2bb25a.graphml +169 -0
  19. graph/incidents_graphml/c/c73b8d40-ed53-11ec-8964-796320a841f1.graphml +77 -0
  20. graph/incidents_graphml/c/c74122b0-2ebf-11ee-9131-1117bdeaaaa3.graphml +113 -0
  21. graph/incidents_graphml/c/c7418380-1958-11ee-b3de-e709a8260af8.graphml +63 -0
  22. graph/incidents_graphml/c/c746f040-0cab-11ee-8985-55bb832fcc7f.graphml +63 -0
  23. graph/incidents_graphml/c/c74f67b0-48e3-11ee-92d0-699b2a8ba251.graphml +63 -0
  24. graph/incidents_graphml/c/c74f6cc0-435f-11ef-9e66-fd84d5bf3736.graphml +113 -0
  25. graph/incidents_graphml/c/c75a62b0-1958-11ee-b3de-e709a8260af8.graphml +63 -0
  26. graph/incidents_graphml/c/c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml +63 -0
  27. graph/incidents_graphml/c/c764f090-435f-11ef-9e66-fd84d5bf3736.graphml +77 -0
  28. graph/incidents_graphml/c/c767f340-95ae-11ed-94b8-8539433cb390.graphml +77 -0
  29. graph/incidents_graphml/c/c7778580-ab01-11ee-ace1-1bcda4a2f9d1.graphml +63 -0
  30. graph/incidents_graphml/c/c7781df0-13f4-11ee-9bb8-6b8312f57fd1.graphml +545 -0
  31. graph/incidents_graphml/c/c779f8a0-1958-11ee-b3de-e709a8260af8.graphml +63 -0
  32. graph/incidents_graphml/c/c788a5e0-276b-11ef-b363-fdc4064c84e0.graphml +77 -0
  33. graph/incidents_graphml/c/c7892d60-a113-11ed-b936-1349c6e38dc6.graphml +63 -0
  34. graph/incidents_graphml/c/c78c9420-ab01-11ee-ace1-1bcda4a2f9d1.graphml +63 -0
  35. graph/incidents_graphml/c/c78e8490-a113-11ed-b936-1349c6e38dc6.graphml +63 -0
  36. graph/incidents_graphml/c/c7a0fc90-8d5f-11ee-9951-411438339097.graphml +77 -0
  37. graph/incidents_graphml/c/c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1.graphml +63 -0
  38. graph/incidents_graphml/c/c7a91ef0-1958-11ee-b3de-e709a8260af8.graphml +63 -0
  39. graph/incidents_graphml/c/c7b0b290-2701-11ed-bc1f-0928ad8774f3.graphml +77 -0
  40. graph/incidents_graphml/c/c7b63020-0b80-11ef-b87c-0d8b17cd9fbf.graphml +113 -0
  41. graph/incidents_graphml/c/c7b6da90-33da-11ed-bcaf-e3fcd610a254.graphml +783 -0
  42. graph/incidents_graphml/c/c7d05e10-0725-11ee-9ff8-05edc9624e6c.graphml +77 -0
  43. graph/incidents_graphml/c/c7d0cb30-1958-11ee-b3de-e709a8260af8.graphml +63 -0
  44. graph/incidents_graphml/c/c7e05460-73d5-11ee-9478-f721b34a9cef.graphml +63 -0
  45. graph/incidents_graphml/c/c7e0f950-ddd0-11ee-a342-9d44f1915d3d.graphml +63 -0
  46. graph/incidents_graphml/c/c7e17d30-3d6c-11ee-b209-c721199fad49.graphml +63 -0
  47. graph/incidents_graphml/c/c7e4c860-1958-11ee-b3de-e709a8260af8.graphml +63 -0
  48. graph/incidents_graphml/c/c7e82540-5789-11ee-b4dd-e56c30c12cd4.graphml +63 -0
  49. graph/incidents_graphml/c/c7ea0b00-0373-11ed-8991-41244357ae3d.graphml +77 -0
  50. graph/incidents_graphml/c/c7f16b60-73d5-11ee-9478-f721b34a9cef.graphml +63 -0
graph/incidents_graphml/c/c69d0810-0e2a-11ef-801a-2fb46581ffa8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="172a2fc0-08a9-11ee-81da-e940bdca9f29">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.41.232</data>
35
+ <data key="n_hostname">100.64.41.232</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.174.172</data>
43
+ <data key="n_hostname">172.30.174.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="172a2fc0-08a9-11ee-81da-e940bdca9f29" target="HOST-2946">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1715276235</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c69d0810-0e2a-11ef-801a-2fb46581ffa8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0afa78d0-3e10-11ee-b7fc-254e746cee15">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.46.206</data>
35
+ <data key="n_hostname">100.64.46.206</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="9ff29330-0627-11ee-ad14-25a724519715">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
47
+ </node>
48
+ <edge id="e1" source="0afa78d0-3e10-11ee-b7fc-254e746cee15" target="HOST-16999">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1704373461</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c6a8e1d0-fa48-11ee-a230-bfe539a81cf2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e8c39ed8-ed8d-11ee-be57-e7ce5e3153e8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.27.41</data>
35
+ <data key="n_hostname">100.64.27.41</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.101.1</data>
43
+ <data key="n_hostname">172.31.101.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-5468" target="HOST-2821">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713090097</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c6a8e1d0-fa48-11ee-a230-bfe539a81cf2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c6acf940-26cd-11ee-863d-83828757c718.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bb4365d4-062f-11ee-99d3-4bf3ed477666">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.10.203</data>
35
+ <data key="n_hostname">100.64.10.203</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.233.43</data>
43
+ <data key="n_hostname">172.16.233.43</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="2f581655-0626-11ee-9882-3f47c834d49b">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.13.223</data>
51
+ <data key="n_hostname">100.64.13.223</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="6885b0e3-0626-11ee-87d2-5909d78e9e20">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.7.39</data>
59
+ <data key="n_hostname">100.64.7.39</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <edge id="e1" source="HOST-3215" target="HOST-2758">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1689837573</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.7890625</data>
69
+ <data key="e_suspicion_score">0.7890625</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">c6acf940-26cd-11ee-863d-83828757c718</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-2758" target="HOST-3215">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1689837573</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.7890625</data>
83
+ <data key="e_suspicion_score">0.7890625</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">c6acf940-26cd-11ee-863d-83828757c718</data>
91
+ </edge>
92
+ <edge id="e3" source="HOST-3622" target="HOST-2758">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1689837573</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.7890625</data>
97
+ <data key="e_suspicion_score">0.7890625</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">c6acf940-26cd-11ee-863d-83828757c718</data>
105
+ </edge>
106
+ <edge id="e4" source="HOST-2758" target="HOST-3622">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1689837573</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.7890625</data>
111
+ <data key="e_suspicion_score">0.7890625</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">c6acf940-26cd-11ee-863d-83828757c718</data>
119
+ </edge>
120
+ <edge id="e5" source="6885b0e3-0626-11ee-87d2-5909d78e9e20" target="HOST-2758">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1689837573</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.7890625</data>
125
+ <data key="e_suspicion_score">0.7890625</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">c6acf940-26cd-11ee-863d-83828757c718</data>
133
+ </edge>
134
+ <edge id="e6" source="HOST-2758" target="6885b0e3-0626-11ee-87d2-5909d78e9e20">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1689837573</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.7890625</data>
139
+ <data key="e_suspicion_score">0.7890625</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">c6acf940-26cd-11ee-863d-83828757c718</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>
graph/incidents_graphml/c/c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="74b5f325-34cf-11ee-befa-2f9557df71fb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.23.161</data>
35
+ <data key="n_hostname">100.64.23.161</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.214.148</data>
43
+ <data key="n_hostname">172.30.214.148</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4956" target="HOST-2720">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1709959925</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9ff29330-0627-11ee-ad14-25a724519715">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="0afa78d0-3e10-11ee-b7fc-254e746cee15">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.46.206</data>
43
+ <data key="n_hostname">100.64.46.206</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16999" target="HOST-18910">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1704373461</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c6bf3610-0e2a-11ef-801a-2fb46581ffa8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7319d380-0665-11ee-a8ac-bb5c5fd6d88d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.41.234</data>
35
+ <data key="n_hostname">100.64.41.234</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.6.172</data>
43
+ <data key="n_hostname">172.31.6.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="7319d380-0665-11ee-a8ac-bb5c5fd6d88d" target="HOST-2757">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1715276235</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c6bf3610-0e2a-11ef-801a-2fb46581ffa8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c6dc4d70-1c97-11ee-b9c1-8f183b2e0424.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="19ae2cf0-0774-11ee-892d-7fcfd5c0e2cb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.76.233</data>
35
+ <data key="n_hostname">100.64.76.233</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="528721e0-0642-11ee-b879-8fa356303378">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.51</data>
43
+ <data key="n_hostname">100.64.72.51</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="19ae2cf0-0774-11ee-892d-7fcfd5c0e2cb" target="528721e0-0642-11ee-b879-8fa356303378">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688714869</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c6dc4d70-1c97-11ee-b9c1-8f183b2e0424</data>
61
+ </edge>
62
+ <edge id="e2" source="528721e0-0642-11ee-b879-8fa356303378" target="19ae2cf0-0774-11ee-892d-7fcfd5c0e2cb">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1688714869</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">c6dc4d70-1c97-11ee-b9c1-8f183b2e0424</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/c/c6f1c230-0ad1-11ef-8694-dbcc61061be0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="85418bc0-e968-11ee-a876-0b133aae710a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.15.142</data>
35
+ <data key="n_hostname">100.64.15.142</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.54.66</data>
43
+ <data key="n_hostname">172.24.54.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="85418bc0-e968-11ee-a876-0b133aae710a" target="HOST-2745">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714908157</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c6f1c230-0ad1-11ef-8694-dbcc61061be0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c6f1f850-1c97-11ee-b9c1-8f183b2e0424.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="71653f21-0638-11ee-9d16-b90ac473a2f2">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.40.45</data>
35
+ <data key="n_hostname">100.64.40.45</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="3b0e86c0-0642-11ee-93f4-159fa6734fa9">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.73.195</data>
43
+ <data key="n_hostname">100.64.73.195</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="d8aa1bf0-063e-11ee-8fd2-af3b08029a6c">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.48.254</data>
51
+ <data key="n_hostname">100.64.48.254</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="49e15462-0648-11ee-b71d-ad0da3528947">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.64.154</data>
59
+ <data key="n_hostname">100.64.64.154</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <edge id="e1" source="71653f21-0638-11ee-9d16-b90ac473a2f2" target="HOST-13332">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1688714869</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.7890625</data>
69
+ <data key="e_suspicion_score">0.7890625</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">c6f1f850-1c97-11ee-b9c1-8f183b2e0424</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-13332" target="71653f21-0638-11ee-9d16-b90ac473a2f2">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1688714869</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.7890625</data>
83
+ <data key="e_suspicion_score">0.7890625</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">c6f1f850-1c97-11ee-b9c1-8f183b2e0424</data>
91
+ </edge>
92
+ <edge id="e3" source="d8aa1bf0-063e-11ee-8fd2-af3b08029a6c" target="HOST-13332">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1688714869</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.7890625</data>
97
+ <data key="e_suspicion_score">0.7890625</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">c6f1f850-1c97-11ee-b9c1-8f183b2e0424</data>
105
+ </edge>
106
+ <edge id="e4" source="HOST-13332" target="d8aa1bf0-063e-11ee-8fd2-af3b08029a6c">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1688714869</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.7890625</data>
111
+ <data key="e_suspicion_score">0.7890625</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">c6f1f850-1c97-11ee-b9c1-8f183b2e0424</data>
119
+ </edge>
120
+ <edge id="e5" source="49e15462-0648-11ee-b71d-ad0da3528947" target="HOST-13332">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1688714869</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.7890625</data>
125
+ <data key="e_suspicion_score">0.7890625</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">c6f1f850-1c97-11ee-b9c1-8f183b2e0424</data>
133
+ </edge>
134
+ <edge id="e6" source="HOST-13332" target="49e15462-0648-11ee-b71d-ad0da3528947">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1688714869</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.7890625</data>
139
+ <data key="e_suspicion_score">0.7890625</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">c6f1f850-1c97-11ee-b9c1-8f183b2e0424</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>
graph/incidents_graphml/c/c6f59170-1a8c-11ee-a9ef-735ae64b5bd4.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="81c7fe75-18bc-11ee-98fb-cd756c0af55d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.80.169</data>
35
+ <data key="n_hostname">100.64.80.169</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="e06a0500-0632-11ee-a699-19fd706a4513">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.137</data>
43
+ <data key="n_hostname">100.64.72.137</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="81c7fe75-18bc-11ee-98fb-cd756c0af55d" target="HOST-13875">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688490243</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c6f59170-1a8c-11ee-a9ef-735ae64b5bd4</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13875" target="81c7fe75-18bc-11ee-98fb-cd756c0af55d">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1688490243</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">c6f59170-1a8c-11ee-a9ef-735ae64b5bd4</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/c/c6f8acf0-df14-11ee-9778-4184b1db151c.graphml ADDED
@@ -0,0 +1,785 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d1cec350-7de7-11ee-bcf9-e5147e3f0332">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.10.33</data>
35
+ <data key="n_hostname">100.64.10.33</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.117.12.163</data>
43
+ <data key="n_hostname">10.117.12.163</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="10300690-ab6a-11ee-9ad3-1bd666531b69">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.10.34</data>
51
+ <data key="n_hostname">100.64.10.34</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="2d2acb82-0625-11ee-b173-c9921719c2f8">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.31.78.41</data>
59
+ <data key="n_hostname">172.31.78.41</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="9d0b2b70-a08a-11ee-b4df-013352fa07f3">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.10.35</data>
67
+ <data key="n_hostname">100.64.10.35</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="2b5251c2-bc1e-11ee-b8c6-a9908c5c42d2">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.10.36</data>
75
+ <data key="n_hostname">100.64.10.36</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">172.26.23.117</data>
83
+ <data key="n_hostname">172.26.23.117</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="cde11bf0-0626-11ee-8860-f951c26910c1">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.10.30</data>
91
+ <data key="n_hostname">100.64.10.30</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="836c1470-84cb-11ee-a675-1f48ca96321b">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.10.37</data>
99
+ <data key="n_hostname">100.64.10.37</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">172.31.6.172</data>
107
+ <data key="n_hostname">172.31.6.172</data>
108
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.25</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="a2ab6a40-062a-11ee-9792-13ac4ddb104c">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.10.38</data>
115
+ <data key="n_hostname">100.64.10.38</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.25</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="7a5f1280-8064-11ee-9547-8b62fe6bab6f">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.10.39</data>
123
+ <data key="n_hostname">100.64.10.39</data>
124
+ <data key="n_set_roles">["Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.25</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="07404761-db4a-11ee-a158-2fcf8a2054e5">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.10.40</data>
131
+ <data key="n_hostname">100.64.10.40</data>
132
+ <data key="n_set_roles">["Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.25</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="9341b8a2-df11-11ee-9f99-ad8aa4a3698e">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.10.41</data>
139
+ <data key="n_hostname">100.64.10.41</data>
140
+ <data key="n_set_roles">["Exploiting Host"]</data>
141
+ <data key="n_suspicion_score">0.25</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <node id="8aadef10-0627-11ee-bb6d-91e4d286acbc">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.10.42</data>
147
+ <data key="n_hostname">100.64.10.42</data>
148
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
149
+ <data key="n_suspicion_score">0.25</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <node id="679c7530-3a22-11ee-b455-439f5edf4254">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.10.43</data>
155
+ <data key="n_hostname">100.64.10.43</data>
156
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
157
+ <data key="n_suspicion_score">0.25</data>
158
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
159
+ </node>
160
+ <node id="bab5f234-83cb-11ee-8fa6-77181c369f68">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.10.44</data>
163
+ <data key="n_hostname">100.64.10.44</data>
164
+ <data key="n_set_roles">["Exploiting Host"]</data>
165
+ <data key="n_suspicion_score">0.25</data>
166
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
167
+ </node>
168
+ <node id="9fdd3922-09da-11ee-ba30-238fae1b5b6e">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">100.64.10.45</data>
171
+ <data key="n_hostname">100.64.10.45</data>
172
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
173
+ <data key="n_suspicion_score">0.25</data>
174
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
175
+ </node>
176
+ <node id="457bcfd0-0626-11ee-8794-6bae0a4a6dd8">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">100.64.10.46</data>
179
+ <data key="n_hostname">100.64.10.46</data>
180
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
181
+ <data key="n_suspicion_score">0.25</data>
182
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
183
+ </node>
184
+ <node id="61d05073-0626-11ee-87d2-5909d78e9e20">
185
+ <data key="n_type">HOST</data>
186
+ <data key="n_ip">100.64.10.47</data>
187
+ <data key="n_hostname">100.64.10.47</data>
188
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
189
+ <data key="n_suspicion_score">0.25</data>
190
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
191
+ </node>
192
+ <node id="5c928290-062b-11ee-b9d7-dfbc3b8151fb">
193
+ <data key="n_type">HOST</data>
194
+ <data key="n_ip">100.64.10.48</data>
195
+ <data key="n_hostname">100.64.10.48</data>
196
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
197
+ <data key="n_suspicion_score">0.25</data>
198
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
199
+ </node>
200
+ <node id="627fe5d2-0630-11ee-b4a5-7b67dc16a2f1">
201
+ <data key="n_type">HOST</data>
202
+ <data key="n_ip">100.64.10.49</data>
203
+ <data key="n_hostname">100.64.10.49</data>
204
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
205
+ <data key="n_suspicion_score">0.25</data>
206
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
207
+ </node>
208
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
209
+ <data key="n_type">HOST</data>
210
+ <data key="n_ip">172.30.208.219</data>
211
+ <data key="n_hostname">172.30.208.219</data>
212
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
213
+ <data key="n_suspicion_score">0.25</data>
214
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
215
+ </node>
216
+ <node id="5ff31ea2-34ce-11ee-b4b4-b5cb39981fef">
217
+ <data key="n_type">HOST</data>
218
+ <data key="n_ip">100.64.10.50</data>
219
+ <data key="n_hostname">100.64.10.50</data>
220
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
221
+ <data key="n_suspicion_score">0.25</data>
222
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
223
+ </node>
224
+ <edge id="e1" source="d1cec350-7de7-11ee-bcf9-e5147e3f0332" target="HOST-2773">
225
+ <data key="e_type">INCIDENT_LINK</data>
226
+ <data key="e_timestamp">1710099082</data>
227
+ <data key="e_label_binary">malicious</data>
228
+ <data key="e_label_confidence">0.7</data>
229
+ <data key="e_suspicion_score">0.25</data>
230
+ <data key="e_mo_name">Data Theft</data>
231
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
232
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
233
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
234
+ <data key="e_lifecycle_stage">complete-mission</data>
235
+ <data key="e_disposition">Unprocessed</data>
236
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
237
+ </edge>
238
+ <edge id="e2" source="HOST-2773" target="d1cec350-7de7-11ee-bcf9-e5147e3f0332">
239
+ <data key="e_type">INCIDENT_LINK</data>
240
+ <data key="e_timestamp">1710099082</data>
241
+ <data key="e_label_binary">malicious</data>
242
+ <data key="e_label_confidence">0.7</data>
243
+ <data key="e_suspicion_score">0.25</data>
244
+ <data key="e_mo_name">Data Theft</data>
245
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
246
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
247
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
248
+ <data key="e_lifecycle_stage">complete-mission</data>
249
+ <data key="e_disposition">Unprocessed</data>
250
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
251
+ </edge>
252
+ <edge id="e3" source="10300690-ab6a-11ee-9ad3-1bd666531b69" target="HOST-2807">
253
+ <data key="e_type">INCIDENT_LINK</data>
254
+ <data key="e_timestamp">1710099082</data>
255
+ <data key="e_label_binary">malicious</data>
256
+ <data key="e_label_confidence">0.7</data>
257
+ <data key="e_suspicion_score">0.25</data>
258
+ <data key="e_mo_name">Data Theft</data>
259
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
260
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
261
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
262
+ <data key="e_lifecycle_stage">complete-mission</data>
263
+ <data key="e_disposition">Unprocessed</data>
264
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
265
+ </edge>
266
+ <edge id="e4" source="HOST-2807" target="10300690-ab6a-11ee-9ad3-1bd666531b69">
267
+ <data key="e_type">INCIDENT_LINK</data>
268
+ <data key="e_timestamp">1710099082</data>
269
+ <data key="e_label_binary">malicious</data>
270
+ <data key="e_label_confidence">0.7</data>
271
+ <data key="e_suspicion_score">0.25</data>
272
+ <data key="e_mo_name">Data Theft</data>
273
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
274
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
275
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
276
+ <data key="e_lifecycle_stage">complete-mission</data>
277
+ <data key="e_disposition">Unprocessed</data>
278
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
279
+ </edge>
280
+ <edge id="e5" source="9d0b2b70-a08a-11ee-b4df-013352fa07f3" target="HOST-2807">
281
+ <data key="e_type">INCIDENT_LINK</data>
282
+ <data key="e_timestamp">1710099082</data>
283
+ <data key="e_label_binary">malicious</data>
284
+ <data key="e_label_confidence">0.7</data>
285
+ <data key="e_suspicion_score">0.25</data>
286
+ <data key="e_mo_name">Data Theft</data>
287
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
288
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
289
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
290
+ <data key="e_lifecycle_stage">complete-mission</data>
291
+ <data key="e_disposition">Unprocessed</data>
292
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
293
+ </edge>
294
+ <edge id="e6" source="HOST-2807" target="9d0b2b70-a08a-11ee-b4df-013352fa07f3">
295
+ <data key="e_type">INCIDENT_LINK</data>
296
+ <data key="e_timestamp">1710099082</data>
297
+ <data key="e_label_binary">malicious</data>
298
+ <data key="e_label_confidence">0.7</data>
299
+ <data key="e_suspicion_score">0.25</data>
300
+ <data key="e_mo_name">Data Theft</data>
301
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
302
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
303
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
304
+ <data key="e_lifecycle_stage">complete-mission</data>
305
+ <data key="e_disposition">Unprocessed</data>
306
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
307
+ </edge>
308
+ <edge id="e7" source="d1cec350-7de7-11ee-bcf9-e5147e3f0332" target="HOST-2807">
309
+ <data key="e_type">INCIDENT_LINK</data>
310
+ <data key="e_timestamp">1710099082</data>
311
+ <data key="e_label_binary">malicious</data>
312
+ <data key="e_label_confidence">0.7</data>
313
+ <data key="e_suspicion_score">0.25</data>
314
+ <data key="e_mo_name">Data Theft</data>
315
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
316
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
317
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
318
+ <data key="e_lifecycle_stage">complete-mission</data>
319
+ <data key="e_disposition">Unprocessed</data>
320
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
321
+ </edge>
322
+ <edge id="e8" source="HOST-2807" target="d1cec350-7de7-11ee-bcf9-e5147e3f0332">
323
+ <data key="e_type">INCIDENT_LINK</data>
324
+ <data key="e_timestamp">1710099082</data>
325
+ <data key="e_label_binary">malicious</data>
326
+ <data key="e_label_confidence">0.7</data>
327
+ <data key="e_suspicion_score">0.25</data>
328
+ <data key="e_mo_name">Data Theft</data>
329
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
330
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
331
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
332
+ <data key="e_lifecycle_stage">complete-mission</data>
333
+ <data key="e_disposition">Unprocessed</data>
334
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
335
+ </edge>
336
+ <edge id="e9" source="2b5251c2-bc1e-11ee-b8c6-a9908c5c42d2" target="HOST-2824">
337
+ <data key="e_type">INCIDENT_LINK</data>
338
+ <data key="e_timestamp">1710099082</data>
339
+ <data key="e_label_binary">malicious</data>
340
+ <data key="e_label_confidence">0.7</data>
341
+ <data key="e_suspicion_score">0.25</data>
342
+ <data key="e_mo_name">Data Theft</data>
343
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
344
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
345
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
346
+ <data key="e_lifecycle_stage">complete-mission</data>
347
+ <data key="e_disposition">Unprocessed</data>
348
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
349
+ </edge>
350
+ <edge id="e10" source="HOST-2824" target="2b5251c2-bc1e-11ee-b8c6-a9908c5c42d2">
351
+ <data key="e_type">INCIDENT_LINK</data>
352
+ <data key="e_timestamp">1710099082</data>
353
+ <data key="e_label_binary">malicious</data>
354
+ <data key="e_label_confidence">0.7</data>
355
+ <data key="e_suspicion_score">0.25</data>
356
+ <data key="e_mo_name">Data Theft</data>
357
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
358
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
359
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
360
+ <data key="e_lifecycle_stage">complete-mission</data>
361
+ <data key="e_disposition">Unprocessed</data>
362
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
363
+ </edge>
364
+ <edge id="e11" source="HOST-3120" target="HOST-2824">
365
+ <data key="e_type">INCIDENT_LINK</data>
366
+ <data key="e_timestamp">1710099082</data>
367
+ <data key="e_label_binary">malicious</data>
368
+ <data key="e_label_confidence">0.7</data>
369
+ <data key="e_suspicion_score">0.25</data>
370
+ <data key="e_mo_name">Data Theft</data>
371
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
372
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
373
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
374
+ <data key="e_lifecycle_stage">complete-mission</data>
375
+ <data key="e_disposition">Unprocessed</data>
376
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
377
+ </edge>
378
+ <edge id="e12" source="HOST-2824" target="HOST-3120">
379
+ <data key="e_type">INCIDENT_LINK</data>
380
+ <data key="e_timestamp">1710099082</data>
381
+ <data key="e_label_binary">malicious</data>
382
+ <data key="e_label_confidence">0.7</data>
383
+ <data key="e_suspicion_score">0.25</data>
384
+ <data key="e_mo_name">Data Theft</data>
385
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
386
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
387
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
388
+ <data key="e_lifecycle_stage">complete-mission</data>
389
+ <data key="e_disposition">Unprocessed</data>
390
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
391
+ </edge>
392
+ <edge id="e13" source="836c1470-84cb-11ee-a675-1f48ca96321b" target="HOST-2824">
393
+ <data key="e_type">INCIDENT_LINK</data>
394
+ <data key="e_timestamp">1710099082</data>
395
+ <data key="e_label_binary">malicious</data>
396
+ <data key="e_label_confidence">0.7</data>
397
+ <data key="e_suspicion_score">0.25</data>
398
+ <data key="e_mo_name">Data Theft</data>
399
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
400
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
401
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
402
+ <data key="e_lifecycle_stage">complete-mission</data>
403
+ <data key="e_disposition">Unprocessed</data>
404
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
405
+ </edge>
406
+ <edge id="e14" source="HOST-2824" target="836c1470-84cb-11ee-a675-1f48ca96321b">
407
+ <data key="e_type">INCIDENT_LINK</data>
408
+ <data key="e_timestamp">1710099082</data>
409
+ <data key="e_label_binary">malicious</data>
410
+ <data key="e_label_confidence">0.7</data>
411
+ <data key="e_suspicion_score">0.25</data>
412
+ <data key="e_mo_name">Data Theft</data>
413
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
414
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
415
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
416
+ <data key="e_lifecycle_stage">complete-mission</data>
417
+ <data key="e_disposition">Unprocessed</data>
418
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
419
+ </edge>
420
+ <edge id="e15" source="d1cec350-7de7-11ee-bcf9-e5147e3f0332" target="HOST-2824">
421
+ <data key="e_type">INCIDENT_LINK</data>
422
+ <data key="e_timestamp">1710099082</data>
423
+ <data key="e_label_binary">malicious</data>
424
+ <data key="e_label_confidence">0.7</data>
425
+ <data key="e_suspicion_score">0.25</data>
426
+ <data key="e_mo_name">Data Theft</data>
427
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
428
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
429
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
430
+ <data key="e_lifecycle_stage">complete-mission</data>
431
+ <data key="e_disposition">Unprocessed</data>
432
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
433
+ </edge>
434
+ <edge id="e16" source="HOST-2824" target="d1cec350-7de7-11ee-bcf9-e5147e3f0332">
435
+ <data key="e_type">INCIDENT_LINK</data>
436
+ <data key="e_timestamp">1710099082</data>
437
+ <data key="e_label_binary">malicious</data>
438
+ <data key="e_label_confidence">0.7</data>
439
+ <data key="e_suspicion_score">0.25</data>
440
+ <data key="e_mo_name">Data Theft</data>
441
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
442
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
443
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
444
+ <data key="e_lifecycle_stage">complete-mission</data>
445
+ <data key="e_disposition">Unprocessed</data>
446
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
447
+ </edge>
448
+ <edge id="e17" source="d1cec350-7de7-11ee-bcf9-e5147e3f0332" target="HOST-2757">
449
+ <data key="e_type">INCIDENT_LINK</data>
450
+ <data key="e_timestamp">1710099082</data>
451
+ <data key="e_label_binary">malicious</data>
452
+ <data key="e_label_confidence">0.7</data>
453
+ <data key="e_suspicion_score">0.25</data>
454
+ <data key="e_mo_name">Data Theft</data>
455
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
456
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
457
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
458
+ <data key="e_lifecycle_stage">complete-mission</data>
459
+ <data key="e_disposition">Unprocessed</data>
460
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
461
+ </edge>
462
+ <edge id="e18" source="HOST-2757" target="d1cec350-7de7-11ee-bcf9-e5147e3f0332">
463
+ <data key="e_type">INCIDENT_LINK</data>
464
+ <data key="e_timestamp">1710099082</data>
465
+ <data key="e_label_binary">malicious</data>
466
+ <data key="e_label_confidence">0.7</data>
467
+ <data key="e_suspicion_score">0.25</data>
468
+ <data key="e_mo_name">Data Theft</data>
469
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
470
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
471
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
472
+ <data key="e_lifecycle_stage">complete-mission</data>
473
+ <data key="e_disposition">Unprocessed</data>
474
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
475
+ </edge>
476
+ <edge id="e19" source="HOST-2807" target="a2ab6a40-062a-11ee-9792-13ac4ddb104c">
477
+ <data key="e_type">INCIDENT_LINK</data>
478
+ <data key="e_timestamp">1710099082</data>
479
+ <data key="e_label_binary">malicious</data>
480
+ <data key="e_label_confidence">0.7</data>
481
+ <data key="e_suspicion_score">0.25</data>
482
+ <data key="e_mo_name">Data Theft</data>
483
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
484
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
485
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
486
+ <data key="e_lifecycle_stage">complete-mission</data>
487
+ <data key="e_disposition">Unprocessed</data>
488
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
489
+ </edge>
490
+ <edge id="e20" source="a2ab6a40-062a-11ee-9792-13ac4ddb104c" target="HOST-2807">
491
+ <data key="e_type">INCIDENT_LINK</data>
492
+ <data key="e_timestamp">1710099082</data>
493
+ <data key="e_label_binary">malicious</data>
494
+ <data key="e_label_confidence">0.7</data>
495
+ <data key="e_suspicion_score">0.25</data>
496
+ <data key="e_mo_name">Data Theft</data>
497
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
498
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
499
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
500
+ <data key="e_lifecycle_stage">complete-mission</data>
501
+ <data key="e_disposition">Unprocessed</data>
502
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
503
+ </edge>
504
+ <edge id="e21" source="7a5f1280-8064-11ee-9547-8b62fe6bab6f" target="HOST-2773">
505
+ <data key="e_type">INCIDENT_LINK</data>
506
+ <data key="e_timestamp">1710099082</data>
507
+ <data key="e_label_binary">malicious</data>
508
+ <data key="e_label_confidence">0.7</data>
509
+ <data key="e_suspicion_score">0.25</data>
510
+ <data key="e_mo_name">Data Theft</data>
511
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
512
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
513
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
514
+ <data key="e_lifecycle_stage">complete-mission</data>
515
+ <data key="e_disposition">Unprocessed</data>
516
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
517
+ </edge>
518
+ <edge id="e22" source="HOST-2773" target="7a5f1280-8064-11ee-9547-8b62fe6bab6f">
519
+ <data key="e_type">INCIDENT_LINK</data>
520
+ <data key="e_timestamp">1710099082</data>
521
+ <data key="e_label_binary">malicious</data>
522
+ <data key="e_label_confidence">0.7</data>
523
+ <data key="e_suspicion_score">0.25</data>
524
+ <data key="e_mo_name">Data Theft</data>
525
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
526
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
527
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
528
+ <data key="e_lifecycle_stage">complete-mission</data>
529
+ <data key="e_disposition">Unprocessed</data>
530
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
531
+ </edge>
532
+ <edge id="e23" source="HOST-2773" target="07404761-db4a-11ee-a158-2fcf8a2054e5">
533
+ <data key="e_type">INCIDENT_LINK</data>
534
+ <data key="e_timestamp">1710099082</data>
535
+ <data key="e_label_binary">malicious</data>
536
+ <data key="e_label_confidence">0.7</data>
537
+ <data key="e_suspicion_score">0.25</data>
538
+ <data key="e_mo_name">Data Theft</data>
539
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
540
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
541
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
542
+ <data key="e_lifecycle_stage">complete-mission</data>
543
+ <data key="e_disposition">Unprocessed</data>
544
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
545
+ </edge>
546
+ <edge id="e24" source="9341b8a2-df11-11ee-9f99-ad8aa4a3698e" target="HOST-2807">
547
+ <data key="e_type">INCIDENT_LINK</data>
548
+ <data key="e_timestamp">1710099082</data>
549
+ <data key="e_label_binary">malicious</data>
550
+ <data key="e_label_confidence">0.7</data>
551
+ <data key="e_suspicion_score">0.25</data>
552
+ <data key="e_mo_name">Data Theft</data>
553
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
554
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
555
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
556
+ <data key="e_lifecycle_stage">complete-mission</data>
557
+ <data key="e_disposition">Unprocessed</data>
558
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
559
+ </edge>
560
+ <edge id="e25" source="HOST-2807" target="9341b8a2-df11-11ee-9f99-ad8aa4a3698e">
561
+ <data key="e_type">INCIDENT_LINK</data>
562
+ <data key="e_timestamp">1710099082</data>
563
+ <data key="e_label_binary">malicious</data>
564
+ <data key="e_label_confidence">0.7</data>
565
+ <data key="e_suspicion_score">0.25</data>
566
+ <data key="e_mo_name">Data Theft</data>
567
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
568
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
569
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
570
+ <data key="e_lifecycle_stage">complete-mission</data>
571
+ <data key="e_disposition">Unprocessed</data>
572
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
573
+ </edge>
574
+ <edge id="e26" source="8aadef10-0627-11ee-bb6d-91e4d286acbc" target="HOST-2824">
575
+ <data key="e_type">INCIDENT_LINK</data>
576
+ <data key="e_timestamp">1710099082</data>
577
+ <data key="e_label_binary">malicious</data>
578
+ <data key="e_label_confidence">0.7</data>
579
+ <data key="e_suspicion_score">0.25</data>
580
+ <data key="e_mo_name">Data Theft</data>
581
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
582
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
583
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
584
+ <data key="e_lifecycle_stage">complete-mission</data>
585
+ <data key="e_disposition">Unprocessed</data>
586
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
587
+ </edge>
588
+ <edge id="e27" source="HOST-2824" target="8aadef10-0627-11ee-bb6d-91e4d286acbc">
589
+ <data key="e_type">INCIDENT_LINK</data>
590
+ <data key="e_timestamp">1710099082</data>
591
+ <data key="e_label_binary">malicious</data>
592
+ <data key="e_label_confidence">0.7</data>
593
+ <data key="e_suspicion_score">0.25</data>
594
+ <data key="e_mo_name">Data Theft</data>
595
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
596
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
597
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
598
+ <data key="e_lifecycle_stage">complete-mission</data>
599
+ <data key="e_disposition">Unprocessed</data>
600
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
601
+ </edge>
602
+ <edge id="e28" source="679c7530-3a22-11ee-b455-439f5edf4254" target="HOST-2807">
603
+ <data key="e_type">INCIDENT_LINK</data>
604
+ <data key="e_timestamp">1710099082</data>
605
+ <data key="e_label_binary">malicious</data>
606
+ <data key="e_label_confidence">0.7</data>
607
+ <data key="e_suspicion_score">0.25</data>
608
+ <data key="e_mo_name">Data Theft</data>
609
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
610
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
611
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
612
+ <data key="e_lifecycle_stage">complete-mission</data>
613
+ <data key="e_disposition">Unprocessed</data>
614
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
615
+ </edge>
616
+ <edge id="e29" source="HOST-2807" target="679c7530-3a22-11ee-b455-439f5edf4254">
617
+ <data key="e_type">INCIDENT_LINK</data>
618
+ <data key="e_timestamp">1710099082</data>
619
+ <data key="e_label_binary">malicious</data>
620
+ <data key="e_label_confidence">0.7</data>
621
+ <data key="e_suspicion_score">0.25</data>
622
+ <data key="e_mo_name">Data Theft</data>
623
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
624
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
625
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
626
+ <data key="e_lifecycle_stage">complete-mission</data>
627
+ <data key="e_disposition">Unprocessed</data>
628
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
629
+ </edge>
630
+ <edge id="e30" source="HOST-2824" target="bab5f234-83cb-11ee-8fa6-77181c369f68">
631
+ <data key="e_type">INCIDENT_LINK</data>
632
+ <data key="e_timestamp">1710099082</data>
633
+ <data key="e_label_binary">malicious</data>
634
+ <data key="e_label_confidence">0.7</data>
635
+ <data key="e_suspicion_score">0.25</data>
636
+ <data key="e_mo_name">Data Theft</data>
637
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
638
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
639
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
640
+ <data key="e_lifecycle_stage">complete-mission</data>
641
+ <data key="e_disposition">Unprocessed</data>
642
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
643
+ </edge>
644
+ <edge id="e31" source="9fdd3922-09da-11ee-ba30-238fae1b5b6e" target="HOST-2757">
645
+ <data key="e_type">INCIDENT_LINK</data>
646
+ <data key="e_timestamp">1710099082</data>
647
+ <data key="e_label_binary">malicious</data>
648
+ <data key="e_label_confidence">0.7</data>
649
+ <data key="e_suspicion_score">0.25</data>
650
+ <data key="e_mo_name">Data Theft</data>
651
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
652
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
653
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
654
+ <data key="e_lifecycle_stage">complete-mission</data>
655
+ <data key="e_disposition">Unprocessed</data>
656
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
657
+ </edge>
658
+ <edge id="e32" source="HOST-2757" target="9fdd3922-09da-11ee-ba30-238fae1b5b6e">
659
+ <data key="e_type">INCIDENT_LINK</data>
660
+ <data key="e_timestamp">1710099082</data>
661
+ <data key="e_label_binary">malicious</data>
662
+ <data key="e_label_confidence">0.7</data>
663
+ <data key="e_suspicion_score">0.25</data>
664
+ <data key="e_mo_name">Data Theft</data>
665
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
666
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
667
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
668
+ <data key="e_lifecycle_stage">complete-mission</data>
669
+ <data key="e_disposition">Unprocessed</data>
670
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
671
+ </edge>
672
+ <edge id="e33" source="HOST-2807" target="457bcfd0-0626-11ee-8794-6bae0a4a6dd8">
673
+ <data key="e_type">INCIDENT_LINK</data>
674
+ <data key="e_timestamp">1710099082</data>
675
+ <data key="e_label_binary">malicious</data>
676
+ <data key="e_label_confidence">0.7</data>
677
+ <data key="e_suspicion_score">0.25</data>
678
+ <data key="e_mo_name">Data Theft</data>
679
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
680
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
681
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
682
+ <data key="e_lifecycle_stage">complete-mission</data>
683
+ <data key="e_disposition">Unprocessed</data>
684
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
685
+ </edge>
686
+ <edge id="e34" source="61d05073-0626-11ee-87d2-5909d78e9e20" target="HOST-2824">
687
+ <data key="e_type">INCIDENT_LINK</data>
688
+ <data key="e_timestamp">1710099082</data>
689
+ <data key="e_label_binary">malicious</data>
690
+ <data key="e_label_confidence">0.7</data>
691
+ <data key="e_suspicion_score">0.25</data>
692
+ <data key="e_mo_name">Data Theft</data>
693
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
694
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
695
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
696
+ <data key="e_lifecycle_stage">complete-mission</data>
697
+ <data key="e_disposition">Unprocessed</data>
698
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
699
+ </edge>
700
+ <edge id="e35" source="HOST-2824" target="61d05073-0626-11ee-87d2-5909d78e9e20">
701
+ <data key="e_type">INCIDENT_LINK</data>
702
+ <data key="e_timestamp">1710099082</data>
703
+ <data key="e_label_binary">malicious</data>
704
+ <data key="e_label_confidence">0.7</data>
705
+ <data key="e_suspicion_score">0.25</data>
706
+ <data key="e_mo_name">Data Theft</data>
707
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
708
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
709
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
710
+ <data key="e_lifecycle_stage">complete-mission</data>
711
+ <data key="e_disposition">Unprocessed</data>
712
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
713
+ </edge>
714
+ <edge id="e36" source="5c928290-062b-11ee-b9d7-dfbc3b8151fb" target="HOST-2807">
715
+ <data key="e_type">INCIDENT_LINK</data>
716
+ <data key="e_timestamp">1710099082</data>
717
+ <data key="e_label_binary">malicious</data>
718
+ <data key="e_label_confidence">0.7</data>
719
+ <data key="e_suspicion_score">0.25</data>
720
+ <data key="e_mo_name">Data Theft</data>
721
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
722
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
723
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
724
+ <data key="e_lifecycle_stage">complete-mission</data>
725
+ <data key="e_disposition">Unprocessed</data>
726
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
727
+ </edge>
728
+ <edge id="e37" source="HOST-2807" target="5c928290-062b-11ee-b9d7-dfbc3b8151fb">
729
+ <data key="e_type">INCIDENT_LINK</data>
730
+ <data key="e_timestamp">1710099082</data>
731
+ <data key="e_label_binary">malicious</data>
732
+ <data key="e_label_confidence">0.7</data>
733
+ <data key="e_suspicion_score">0.25</data>
734
+ <data key="e_mo_name">Data Theft</data>
735
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
736
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
737
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
738
+ <data key="e_lifecycle_stage">complete-mission</data>
739
+ <data key="e_disposition">Unprocessed</data>
740
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
741
+ </edge>
742
+ <edge id="e38" source="HOST-2773" target="627fe5d2-0630-11ee-b4a5-7b67dc16a2f1">
743
+ <data key="e_type">INCIDENT_LINK</data>
744
+ <data key="e_timestamp">1710099082</data>
745
+ <data key="e_label_binary">malicious</data>
746
+ <data key="e_label_confidence">0.7</data>
747
+ <data key="e_suspicion_score">0.25</data>
748
+ <data key="e_mo_name">Data Theft</data>
749
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
750
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
751
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
752
+ <data key="e_lifecycle_stage">complete-mission</data>
753
+ <data key="e_disposition">Unprocessed</data>
754
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
755
+ </edge>
756
+ <edge id="e39" source="a2ab6a40-062a-11ee-9792-13ac4ddb104c" target="HOST-2823">
757
+ <data key="e_type">INCIDENT_LINK</data>
758
+ <data key="e_timestamp">1710099082</data>
759
+ <data key="e_label_binary">malicious</data>
760
+ <data key="e_label_confidence">0.7</data>
761
+ <data key="e_suspicion_score">0.25</data>
762
+ <data key="e_mo_name">Data Theft</data>
763
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
764
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
765
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
766
+ <data key="e_lifecycle_stage">complete-mission</data>
767
+ <data key="e_disposition">Unprocessed</data>
768
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
769
+ </edge>
770
+ <edge id="e40" source="HOST-2773" target="5ff31ea2-34ce-11ee-b4b4-b5cb39981fef">
771
+ <data key="e_type">INCIDENT_LINK</data>
772
+ <data key="e_timestamp">1710099082</data>
773
+ <data key="e_label_binary">malicious</data>
774
+ <data key="e_label_confidence">0.7</data>
775
+ <data key="e_suspicion_score">0.25</data>
776
+ <data key="e_mo_name">Data Theft</data>
777
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
778
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
779
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
780
+ <data key="e_lifecycle_stage">complete-mission</data>
781
+ <data key="e_disposition">Unprocessed</data>
782
+ <data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
783
+ </edge>
784
+ </graph>
785
+ </graphml>
graph/incidents_graphml/c/c6fa8d40-ab6c-11ed-b288-05f5e2790b36.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f09dc891-9fb6-11ed-a695-2d3229ed252d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.88.92</data>
35
+ <data key="n_hostname">100.64.88.92</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f96c084-9d8d-11ed-8ff2-3593b92fed96">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="f09dc891-9fb6-11ed-a695-2d3229ed252d" target="HOST-16926">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1676271920</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c6fa8d40-ab6c-11ed-b288-05f5e2790b36</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c6ff4830-ab6c-11ed-b288-05f5e2790b36.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9f96c084-9d8d-11ed-8ff2-3593b92fed96">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="f09dc891-9fb6-11ed-a695-2d3229ed252d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.88.92</data>
43
+ <data key="n_hostname">100.64.88.92</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16926" target="HOST-17530">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1676271920</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c6ff4830-ab6c-11ed-b288-05f5e2790b36</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c7167d60-ddd0-11ee-a342-9d44f1915d3d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.217.8</data>
35
+ <data key="n_hostname">172.24.217.8</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ba89ffe1-063a-11ee-9f2c-63aa0a31eb0a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.30.78</data>
43
+ <data key="n_hostname">100.64.30.78</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2731" target="HOST-5922">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1709959925</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c7167d60-ddd0-11ee-a342-9d44f1915d3d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c721b500-0cab-11ee-8985-55bb832fcc7f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d891b520-0642-11ee-9bd9-51b109f6b127">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.31.15</data>
35
+ <data key="n_hostname">100.64.31.15</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="6b9ddea1-062c-11ee-b3b1-23c171fd7d30">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.67</data>
43
+ <data key="n_hostname">100.64.72.67</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="d891b520-0642-11ee-9bd9-51b109f6b127" target="HOST-14279">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686964241</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c721b500-0cab-11ee-8985-55bb832fcc7f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c72f7f50-ed53-11ec-8964-796320a841f1.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="159965b0-eb48-11ec-948c-473737dbb93c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">192.168.36.227</data>
35
+ <data key="n_hostname">192.168.36.227</data>
36
+ <data key="n_set_roles">[]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="c5386dc2-ebf4-11ec-8e75-d5158505abcd">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.110.41.138</data>
43
+ <data key="n_hostname">10.110.41.138</data>
44
+ <data key="n_set_roles">[]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="159965b0-eb48-11ec-948c-473737dbb93c" target="c5386dc2-ebf4-11ec-8e75-d5158505abcd">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1655370462</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.4375</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">[]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c72f7f50-ed53-11ec-8964-796320a841f1</data>
61
+ </edge>
62
+ <edge id="e2" source="c5386dc2-ebf4-11ec-8e75-d5158505abcd" target="159965b0-eb48-11ec-948c-473737dbb93c">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1655370462</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.4375</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">[]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">c72f7f50-ed53-11ec-8964-796320a841f1</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/c/c7374510-3027-11ee-a433-a916fb2bb25a.graphml ADDED
@@ -0,0 +1,169 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e5ff9cb1-2e36-11ee-a319-f3d9989c38f6">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.69.72</data>
35
+ <data key="n_hostname">100.64.69.72</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.49375</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="13f0b4d9-0626-11ee-86d0-ab9d4a7dffa4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.12</data>
43
+ <data key="n_hostname">100.64.68.12</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.746875</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <node id="820df85b-087a-11ee-bbbe-fd6fe3718a1d">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.69.73</data>
51
+ <data key="n_hostname">100.64.69.73</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.49375</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <node id="21042df8-0626-11ee-a516-e5f53f634990">
57
+ <data key="n_type">SERVICE</data>
58
+ <data key="n_set_roles">["Exploited Service"]</data>
59
+ <data key="n_suspicion_score">0.325</data>
60
+ <data key="n_products">["Precinct"]</data>
61
+ </node>
62
+ <node id="6631938c-2a1c-11ee-94d7-37ee770afd21">
63
+ <data key="n_type">HOST</data>
64
+ <data key="n_ip">100.64.58.41</data>
65
+ <data key="n_hostname">100.64.58.41</data>
66
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
67
+ <data key="n_suspicion_score">0.746875</data>
68
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
69
+ </node>
70
+ <edge id="e1" source="e5ff9cb1-2e36-11ee-a319-f3d9989c38f6" target="HOST-11382">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1690865789</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.746875</data>
75
+ <data key="e_suspicion_score">0.746875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
83
+ </edge>
84
+ <edge id="e2" source="HOST-11382" target="e5ff9cb1-2e36-11ee-a319-f3d9989c38f6">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1690865789</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.746875</data>
89
+ <data key="e_suspicion_score">0.746875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
97
+ </edge>
98
+ <edge id="e3" source="820df85b-087a-11ee-bbbe-fd6fe3718a1d" target="HOST-11382">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1690865789</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.746875</data>
103
+ <data key="e_suspicion_score">0.746875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
111
+ </edge>
112
+ <edge id="e4" source="HOST-11382" target="820df85b-087a-11ee-bbbe-fd6fe3718a1d">
113
+ <data key="e_type">INCIDENT_LINK</data>
114
+ <data key="e_timestamp">1690865789</data>
115
+ <data key="e_label_binary">malicious</data>
116
+ <data key="e_label_confidence">0.746875</data>
117
+ <data key="e_suspicion_score">0.746875</data>
118
+ <data key="e_mo_name">Data Theft</data>
119
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
120
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
121
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
122
+ <data key="e_lifecycle_stage">complete-mission</data>
123
+ <data key="e_disposition">Disrupted</data>
124
+ <data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
125
+ </edge>
126
+ <edge id="e5" source="HOST-11382" target="HOST-11751">
127
+ <data key="e_type">INCIDENT_LINK</data>
128
+ <data key="e_timestamp">1690865789</data>
129
+ <data key="e_label_binary">malicious</data>
130
+ <data key="e_label_confidence">0.746875</data>
131
+ <data key="e_suspicion_score">0.746875</data>
132
+ <data key="e_mo_name">Data Theft</data>
133
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
134
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
135
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
136
+ <data key="e_lifecycle_stage">complete-mission</data>
137
+ <data key="e_disposition">Disrupted</data>
138
+ <data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
139
+ </edge>
140
+ <edge id="e6" source="HOST-11759" target="HOST-11382">
141
+ <data key="e_type">INCIDENT_LINK</data>
142
+ <data key="e_timestamp">1690865789</data>
143
+ <data key="e_label_binary">malicious</data>
144
+ <data key="e_label_confidence">0.746875</data>
145
+ <data key="e_suspicion_score">0.746875</data>
146
+ <data key="e_mo_name">Data Theft</data>
147
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
148
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
149
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
150
+ <data key="e_lifecycle_stage">complete-mission</data>
151
+ <data key="e_disposition">Disrupted</data>
152
+ <data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
153
+ </edge>
154
+ <edge id="e7" source="HOST-11382" target="HOST-11759">
155
+ <data key="e_type">INCIDENT_LINK</data>
156
+ <data key="e_timestamp">1690865789</data>
157
+ <data key="e_label_binary">malicious</data>
158
+ <data key="e_label_confidence">0.746875</data>
159
+ <data key="e_suspicion_score">0.746875</data>
160
+ <data key="e_mo_name">Data Theft</data>
161
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
162
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
163
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
164
+ <data key="e_lifecycle_stage">complete-mission</data>
165
+ <data key="e_disposition">Disrupted</data>
166
+ <data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
167
+ </edge>
168
+ </graph>
169
+ </graphml>
graph/incidents_graphml/c/c73b8d40-ed53-11ec-8964-796320a841f1.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2b2f4833-eb76-11ec-bab8-79b5f5075a8b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.79.176</data>
35
+ <data key="n_hostname">100.64.79.176</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="f1b19f70-ea91-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.234</data>
43
+ <data key="n_hostname">100.64.71.234</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="2b2f4833-eb76-11ec-bab8-79b5f5075a8b" target="HOST-12777">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1655370462</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c73b8d40-ed53-11ec-8964-796320a841f1</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-12777" target="2b2f4833-eb76-11ec-bab8-79b5f5075a8b">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1655370462</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">c73b8d40-ed53-11ec-8964-796320a841f1</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/c/c74122b0-2ebf-11ee-9131-1117bdeaaaa3.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="af79fd40-064d-11ee-8da5-17111c999584">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.9.241</data>
35
+ <data key="n_hostname">100.64.9.241</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="da1e4005-062b-11ee-9107-f38fe9e09310">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.232</data>
43
+ <data key="n_hostname">100.64.71.232</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="bac191b1-2757-11ee-a5e4-e3920eeeffc4">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.12.193</data>
51
+ <data key="n_hostname">100.64.12.193</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <edge id="e1" source="af79fd40-064d-11ee-8da5-17111c999584" target="da1e4005-062b-11ee-9107-f38fe9e09310">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1690711171</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7890625</data>
61
+ <data key="e_suspicion_score">0.7890625</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">c74122b0-2ebf-11ee-9131-1117bdeaaaa3</data>
69
+ </edge>
70
+ <edge id="e2" source="da1e4005-062b-11ee-9107-f38fe9e09310" target="af79fd40-064d-11ee-8da5-17111c999584">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1690711171</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7890625</data>
75
+ <data key="e_suspicion_score">0.7890625</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">c74122b0-2ebf-11ee-9131-1117bdeaaaa3</data>
83
+ </edge>
84
+ <edge id="e3" source="bac191b1-2757-11ee-a5e4-e3920eeeffc4" target="da1e4005-062b-11ee-9107-f38fe9e09310">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1690711171</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.7890625</data>
89
+ <data key="e_suspicion_score">0.7890625</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">c74122b0-2ebf-11ee-9131-1117bdeaaaa3</data>
97
+ </edge>
98
+ <edge id="e4" source="da1e4005-062b-11ee-9107-f38fe9e09310" target="bac191b1-2757-11ee-a5e4-e3920eeeffc4">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1690711171</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.7890625</data>
103
+ <data key="e_suspicion_score">0.7890625</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">c74122b0-2ebf-11ee-9131-1117bdeaaaa3</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/c/c7418380-1958-11ee-b3de-e709a8260af8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="a56ffcf1-0634-11ee-8c8d-fb1faaa0b25f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.78.243</data>
43
+ <data key="n_hostname">100.64.78.243</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-13083" target="a56ffcf1-0634-11ee-8c8d-fb1faaa0b25f">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688357958</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c7418380-1958-11ee-b3de-e709a8260af8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c746f040-0cab-11ee-8985-55bb832fcc7f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="6b9ddea1-062c-11ee-b3b1-23c171fd7d30">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.72.67</data>
35
+ <data key="n_hostname">100.64.72.67</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="d891b520-0642-11ee-9bd9-51b109f6b127">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.31.15</data>
43
+ <data key="n_hostname">100.64.31.15</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-14279" target="HOST-16654">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686964241</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c746f040-0cab-11ee-8985-55bb832fcc7f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c74f67b0-48e3-11ee-92d0-699b2a8ba251.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f60a040-3b78-11ee-a913-ff566cafa25c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.43.69</data>
43
+ <data key="n_hostname">100.64.43.69</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2748" target="HOST-7691">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1693585363</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c74f67b0-48e3-11ee-92d0-699b2a8ba251</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c74f6cc0-435f-11ef-9e66-fd84d5bf3736.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="cb524720-29d3-11ef-81d4-df8023cc6201">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.2.181</data>
35
+ <data key="n_hostname">100.64.2.181</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="75a084c1-28f4-11ef-8b71-dd8359e7840d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="bc9ad652-28f4-11ef-a77c-efa856b3599e">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.20.107</data>
51
+ <data key="n_hostname">100.64.20.107</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-5065" target="HOST-5063">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1721126411</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">c74f6cc0-435f-11ef-9e66-fd84d5bf3736</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-5063" target="HOST-5065">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1721126411</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">c74f6cc0-435f-11ef-9e66-fd84d5bf3736</data>
83
+ </edge>
84
+ <edge id="e3" source="bc9ad652-28f4-11ef-a77c-efa856b3599e" target="HOST-5063">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1721126411</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">c74f6cc0-435f-11ef-9e66-fd84d5bf3736</data>
97
+ </edge>
98
+ <edge id="e4" source="HOST-5063" target="bc9ad652-28f4-11ef-a77c-efa856b3599e">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1721126411</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">c74f6cc0-435f-11ef-9e66-fd84d5bf3736</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/c/c75a62b0-1958-11ee-b3de-e709a8260af8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="485ac321-0642-11ee-b879-8fa356303378">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.71.201</data>
35
+ <data key="n_hostname">100.64.71.201</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="485ac321-0642-11ee-b879-8fa356303378" target="HOST-13083">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688357958</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c75a62b0-1958-11ee-b3de-e709a8260af8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="62db6814-137d-11ee-9633-0bc37fed8e1a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.17.75</data>
35
+ <data key="n_hostname">USER-0015-2143.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2be445e1-3a27-11ee-ae3f-8728131a5906">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.207.79.45</data>
43
+ <data key="n_hostname">HOST-18911</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
47
+ </node>
48
+ <edge id="e1" source="62db6814-137d-11ee-9633-0bc37fed8e1a" target="HOST-17156">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1704373462</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c764f090-435f-11ef-9e66-fd84d5bf3736.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d3b524d3-28f4-11ef-aead-b741176e73de">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.18.96.192</data>
35
+ <data key="n_hostname">172.18.96.192</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="cde947c1-28f9-11ef-ab77-df296f5b45ef">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.211</data>
43
+ <data key="n_hostname">100.64.8.211</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-5336" target="cde947c1-28f9-11ef-ab77-df296f5b45ef">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1721126411</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c764f090-435f-11ef-9e66-fd84d5bf3736</data>
61
+ </edge>
62
+ <edge id="e2" source="cde947c1-28f9-11ef-ab77-df296f5b45ef" target="HOST-5336">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1721126411</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">c764f090-435f-11ef-9e66-fd84d5bf3736</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/c/c767f340-95ae-11ed-94b8-8539433cb390.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c5884114-eb68-11ec-988c-1dba0e32287f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.5.176</data>
35
+ <data key="n_hostname">100.64.5.176</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="2f9f6011-0d42-11ed-964e-f92285ef2afd">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.93</data>
43
+ <data key="n_hostname">100.64.71.93</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-13852" target="HOST-13686">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1673881342</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c767f340-95ae-11ed-94b8-8539433cb390</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13686" target="HOST-13852">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1673881342</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">c767f340-95ae-11ed-94b8-8539433cb390</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/c/c7778580-ab01-11ee-ace1-1bcda4a2f9d1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2be445e1-3a27-11ee-ae3f-8728131a5906">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.207.79.45</data>
35
+ <data key="n_hostname">HOST-18911</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="62db6814-137d-11ee-9633-0bc37fed8e1a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.17.75</data>
43
+ <data key="n_hostname">USER-0015-2143.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17156" target="HOST-18912">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1704373462</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c7778580-ab01-11ee-ace1-1bcda4a2f9d1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c7781df0-13f4-11ee-9bb8-6b8312f57fd1.graphml ADDED
@@ -0,0 +1,545 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="02416360-1382-11ee-b5ea-d72d376077e2">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.72.210</data>
35
+ <data key="n_hostname">100.64.72.210</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7626953125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="982bc921-062f-11ee-952c-95ab55abf2b7">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.211</data>
43
+ <data key="n_hostname">100.64.72.211</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="ed6e0a40-0631-11ee-be55-af682c51cd88">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.72.212</data>
51
+ <data key="n_hostname">100.64.72.212</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="405b12f0-0643-11ee-93f4-159fa6734fa9">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.71.125</data>
59
+ <data key="n_hostname">100.64.71.125</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
63
+ </node>
64
+ <node id="7407c130-0ca0-11ee-bb87-fd08cd371919">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.72.213</data>
67
+ <data key="n_hostname">100.64.72.213</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <node id="eff0d5d3-0637-11ee-a699-19fd706a4513">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.72.49</data>
75
+ <data key="n_hostname">100.64.72.49</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.7890625</data>
78
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
79
+ </node>
80
+ <node id="3c56c8c0-0643-11ee-bb46-852ef6feba5f">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.7.71</data>
83
+ <data key="n_hostname">100.64.7.71</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
87
+ </node>
88
+ <node id="d7cf2414-0624-11ee-a961-f3aa8f0c341a">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.72.214</data>
91
+ <data key="n_hostname">100.64.72.214</data>
92
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.7890625</data>
94
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
95
+ </node>
96
+ <node id="3f525be0-064b-11ee-9985-07904b564370">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.38.41</data>
99
+ <data key="n_hostname">100.64.38.41</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
103
+ </node>
104
+ <node id="55c1be00-0643-11ee-9488-69c5977d12da">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.72.215</data>
107
+ <data key="n_hostname">100.64.72.215</data>
108
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.71875</data>
110
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
111
+ </node>
112
+ <node id="1dd1e450-0627-11ee-8ffb-516c3122460e">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.50.138</data>
115
+ <data key="n_hostname">USER-0015-1641.example.internal</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.7890625</data>
118
+ <data key="n_products">["Precinct","Meraki"]</data>
119
+ </node>
120
+ <node id="381743f2-1270-11ee-827e-818da6a5fbda">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.72.216</data>
123
+ <data key="n_hostname">100.64.72.216</data>
124
+ <data key="n_set_roles">["Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.578125</data>
126
+ <data key="n_products">["Precinct","Meraki"]</data>
127
+ </node>
128
+ <node id="53c44be0-0639-11ee-9501-6bd93ff6f499">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.72.217</data>
131
+ <data key="n_hostname">100.64.72.217</data>
132
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
133
+ <data key="n_suspicion_score">0.7890625</data>
134
+ <data key="n_products">["Precinct","Meraki"]</data>
135
+ </node>
136
+ <node id="f2d5cbe0-06bc-11ee-9979-bb10b4b96e24">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.72.218</data>
139
+ <data key="n_hostname">100.64.72.218</data>
140
+ <data key="n_set_roles">["Exploiting Host"]</data>
141
+ <data key="n_suspicion_score">0.578125</data>
142
+ <data key="n_products">["Precinct","Meraki"]</data>
143
+ </node>
144
+ <node id="ac005de2-06b0-11ee-9899-b5805856eb5f">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.39.224</data>
147
+ <data key="n_hostname">100.64.39.224</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.4375</data>
150
+ <data key="n_products">["Precinct","Meraki"]</data>
151
+ </node>
152
+ <edge id="e1" source="02416360-1382-11ee-b5ea-d72d376077e2" target="982bc921-062f-11ee-952c-95ab55abf2b7">
153
+ <data key="e_type">INCIDENT_LINK</data>
154
+ <data key="e_timestamp">1687765253</data>
155
+ <data key="e_label_binary">malicious</data>
156
+ <data key="e_label_confidence">0.7890625</data>
157
+ <data key="e_suspicion_score">0.7890625</data>
158
+ <data key="e_mo_name">Data Theft</data>
159
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
160
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
161
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
162
+ <data key="e_lifecycle_stage">complete-mission</data>
163
+ <data key="e_disposition">Disrupted</data>
164
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
165
+ </edge>
166
+ <edge id="e2" source="982bc921-062f-11ee-952c-95ab55abf2b7" target="02416360-1382-11ee-b5ea-d72d376077e2">
167
+ <data key="e_type">INCIDENT_LINK</data>
168
+ <data key="e_timestamp">1687765253</data>
169
+ <data key="e_label_binary">malicious</data>
170
+ <data key="e_label_confidence">0.7890625</data>
171
+ <data key="e_suspicion_score">0.7890625</data>
172
+ <data key="e_mo_name">Data Theft</data>
173
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
174
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
175
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
176
+ <data key="e_lifecycle_stage">complete-mission</data>
177
+ <data key="e_disposition">Disrupted</data>
178
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
179
+ </edge>
180
+ <edge id="e3" source="02416360-1382-11ee-b5ea-d72d376077e2" target="ed6e0a40-0631-11ee-be55-af682c51cd88">
181
+ <data key="e_type">INCIDENT_LINK</data>
182
+ <data key="e_timestamp">1687765253</data>
183
+ <data key="e_label_binary">malicious</data>
184
+ <data key="e_label_confidence">0.7890625</data>
185
+ <data key="e_suspicion_score">0.7890625</data>
186
+ <data key="e_mo_name">Data Theft</data>
187
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
188
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
189
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
190
+ <data key="e_lifecycle_stage">complete-mission</data>
191
+ <data key="e_disposition">Disrupted</data>
192
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
193
+ </edge>
194
+ <edge id="e4" source="ed6e0a40-0631-11ee-be55-af682c51cd88" target="02416360-1382-11ee-b5ea-d72d376077e2">
195
+ <data key="e_type">INCIDENT_LINK</data>
196
+ <data key="e_timestamp">1687765253</data>
197
+ <data key="e_label_binary">malicious</data>
198
+ <data key="e_label_confidence">0.7890625</data>
199
+ <data key="e_suspicion_score">0.7890625</data>
200
+ <data key="e_mo_name">Data Theft</data>
201
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
202
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
203
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
204
+ <data key="e_lifecycle_stage">complete-mission</data>
205
+ <data key="e_disposition">Disrupted</data>
206
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
207
+ </edge>
208
+ <edge id="e5" source="02416360-1382-11ee-b5ea-d72d376077e2" target="HOST-12984">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1687765253</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.7890625</data>
213
+ <data key="e_suspicion_score">0.7890625</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Disrupted</data>
220
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
221
+ </edge>
222
+ <edge id="e6" source="HOST-12984" target="02416360-1382-11ee-b5ea-d72d376077e2">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1687765253</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.7890625</data>
227
+ <data key="e_suspicion_score">0.7890625</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Disrupted</data>
234
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
235
+ </edge>
236
+ <edge id="e7" source="7407c130-0ca0-11ee-bb87-fd08cd371919" target="eff0d5d3-0637-11ee-a699-19fd706a4513">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1687765253</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.7890625</data>
241
+ <data key="e_suspicion_score">0.7890625</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Disrupted</data>
248
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
249
+ </edge>
250
+ <edge id="e8" source="eff0d5d3-0637-11ee-a699-19fd706a4513" target="7407c130-0ca0-11ee-bb87-fd08cd371919">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1687765253</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.7890625</data>
255
+ <data key="e_suspicion_score">0.7890625</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Disrupted</data>
262
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
263
+ </edge>
264
+ <edge id="e9" source="02416360-1382-11ee-b5ea-d72d376077e2" target="eff0d5d3-0637-11ee-a699-19fd706a4513">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1687765253</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.7890625</data>
269
+ <data key="e_suspicion_score">0.7890625</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Disrupted</data>
276
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
277
+ </edge>
278
+ <edge id="e10" source="eff0d5d3-0637-11ee-a699-19fd706a4513" target="02416360-1382-11ee-b5ea-d72d376077e2">
279
+ <data key="e_type">INCIDENT_LINK</data>
280
+ <data key="e_timestamp">1687765253</data>
281
+ <data key="e_label_binary">malicious</data>
282
+ <data key="e_label_confidence">0.7890625</data>
283
+ <data key="e_suspicion_score">0.7890625</data>
284
+ <data key="e_mo_name">Data Theft</data>
285
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
286
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
287
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
288
+ <data key="e_lifecycle_stage">complete-mission</data>
289
+ <data key="e_disposition">Disrupted</data>
290
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
291
+ </edge>
292
+ <edge id="e11" source="3c56c8c0-0643-11ee-bb46-852ef6feba5f" target="d7cf2414-0624-11ee-a961-f3aa8f0c341a">
293
+ <data key="e_type">INCIDENT_LINK</data>
294
+ <data key="e_timestamp">1687765253</data>
295
+ <data key="e_label_binary">malicious</data>
296
+ <data key="e_label_confidence">0.7890625</data>
297
+ <data key="e_suspicion_score">0.7890625</data>
298
+ <data key="e_mo_name">Data Theft</data>
299
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
300
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
301
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
302
+ <data key="e_lifecycle_stage">complete-mission</data>
303
+ <data key="e_disposition">Disrupted</data>
304
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
305
+ </edge>
306
+ <edge id="e12" source="d7cf2414-0624-11ee-a961-f3aa8f0c341a" target="3c56c8c0-0643-11ee-bb46-852ef6feba5f">
307
+ <data key="e_type">INCIDENT_LINK</data>
308
+ <data key="e_timestamp">1687765253</data>
309
+ <data key="e_label_binary">malicious</data>
310
+ <data key="e_label_confidence">0.7890625</data>
311
+ <data key="e_suspicion_score">0.7890625</data>
312
+ <data key="e_mo_name">Data Theft</data>
313
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
314
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
315
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
316
+ <data key="e_lifecycle_stage">complete-mission</data>
317
+ <data key="e_disposition">Disrupted</data>
318
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
319
+ </edge>
320
+ <edge id="e13" source="02416360-1382-11ee-b5ea-d72d376077e2" target="d7cf2414-0624-11ee-a961-f3aa8f0c341a">
321
+ <data key="e_type">INCIDENT_LINK</data>
322
+ <data key="e_timestamp">1687765253</data>
323
+ <data key="e_label_binary">malicious</data>
324
+ <data key="e_label_confidence">0.7890625</data>
325
+ <data key="e_suspicion_score">0.7890625</data>
326
+ <data key="e_mo_name">Data Theft</data>
327
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
328
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
329
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
330
+ <data key="e_lifecycle_stage">complete-mission</data>
331
+ <data key="e_disposition">Disrupted</data>
332
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
333
+ </edge>
334
+ <edge id="e14" source="d7cf2414-0624-11ee-a961-f3aa8f0c341a" target="02416360-1382-11ee-b5ea-d72d376077e2">
335
+ <data key="e_type">INCIDENT_LINK</data>
336
+ <data key="e_timestamp">1687765253</data>
337
+ <data key="e_label_binary">malicious</data>
338
+ <data key="e_label_confidence">0.7890625</data>
339
+ <data key="e_suspicion_score">0.7890625</data>
340
+ <data key="e_mo_name">Data Theft</data>
341
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
342
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
343
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
344
+ <data key="e_lifecycle_stage">complete-mission</data>
345
+ <data key="e_disposition">Disrupted</data>
346
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
347
+ </edge>
348
+ <edge id="e15" source="3f525be0-064b-11ee-9985-07904b564370" target="55c1be00-0643-11ee-9488-69c5977d12da">
349
+ <data key="e_type">INCIDENT_LINK</data>
350
+ <data key="e_timestamp">1687765253</data>
351
+ <data key="e_label_binary">malicious</data>
352
+ <data key="e_label_confidence">0.7890625</data>
353
+ <data key="e_suspicion_score">0.7890625</data>
354
+ <data key="e_mo_name">Data Theft</data>
355
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
356
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
357
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
358
+ <data key="e_lifecycle_stage">complete-mission</data>
359
+ <data key="e_disposition">Disrupted</data>
360
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
361
+ </edge>
362
+ <edge id="e16" source="55c1be00-0643-11ee-9488-69c5977d12da" target="3f525be0-064b-11ee-9985-07904b564370">
363
+ <data key="e_type">INCIDENT_LINK</data>
364
+ <data key="e_timestamp">1687765253</data>
365
+ <data key="e_label_binary">malicious</data>
366
+ <data key="e_label_confidence">0.7890625</data>
367
+ <data key="e_suspicion_score">0.7890625</data>
368
+ <data key="e_mo_name">Data Theft</data>
369
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
370
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
371
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
372
+ <data key="e_lifecycle_stage">complete-mission</data>
373
+ <data key="e_disposition">Disrupted</data>
374
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
375
+ </edge>
376
+ <edge id="e17" source="02416360-1382-11ee-b5ea-d72d376077e2" target="55c1be00-0643-11ee-9488-69c5977d12da">
377
+ <data key="e_type">INCIDENT_LINK</data>
378
+ <data key="e_timestamp">1687765253</data>
379
+ <data key="e_label_binary">malicious</data>
380
+ <data key="e_label_confidence">0.7890625</data>
381
+ <data key="e_suspicion_score">0.7890625</data>
382
+ <data key="e_mo_name">Data Theft</data>
383
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
384
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
385
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
386
+ <data key="e_lifecycle_stage">complete-mission</data>
387
+ <data key="e_disposition">Disrupted</data>
388
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
389
+ </edge>
390
+ <edge id="e18" source="55c1be00-0643-11ee-9488-69c5977d12da" target="02416360-1382-11ee-b5ea-d72d376077e2">
391
+ <data key="e_type">INCIDENT_LINK</data>
392
+ <data key="e_timestamp">1687765253</data>
393
+ <data key="e_label_binary">malicious</data>
394
+ <data key="e_label_confidence">0.7890625</data>
395
+ <data key="e_suspicion_score">0.7890625</data>
396
+ <data key="e_mo_name">Data Theft</data>
397
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
398
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
399
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
400
+ <data key="e_lifecycle_stage">complete-mission</data>
401
+ <data key="e_disposition">Disrupted</data>
402
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
403
+ </edge>
404
+ <edge id="e19" source="1dd1e450-0627-11ee-8ffb-516c3122460e" target="eff0d5d3-0637-11ee-a699-19fd706a4513">
405
+ <data key="e_type">INCIDENT_LINK</data>
406
+ <data key="e_timestamp">1687765253</data>
407
+ <data key="e_label_binary">malicious</data>
408
+ <data key="e_label_confidence">0.7890625</data>
409
+ <data key="e_suspicion_score">0.7890625</data>
410
+ <data key="e_mo_name">Data Theft</data>
411
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
412
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
413
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
414
+ <data key="e_lifecycle_stage">complete-mission</data>
415
+ <data key="e_disposition">Disrupted</data>
416
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
417
+ </edge>
418
+ <edge id="e20" source="eff0d5d3-0637-11ee-a699-19fd706a4513" target="1dd1e450-0627-11ee-8ffb-516c3122460e">
419
+ <data key="e_type">INCIDENT_LINK</data>
420
+ <data key="e_timestamp">1687765253</data>
421
+ <data key="e_label_binary">malicious</data>
422
+ <data key="e_label_confidence">0.7890625</data>
423
+ <data key="e_suspicion_score">0.7890625</data>
424
+ <data key="e_mo_name">Data Theft</data>
425
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
426
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
427
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
428
+ <data key="e_lifecycle_stage">complete-mission</data>
429
+ <data key="e_disposition">Disrupted</data>
430
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
431
+ </edge>
432
+ <edge id="e21" source="381743f2-1270-11ee-827e-818da6a5fbda" target="d7cf2414-0624-11ee-a961-f3aa8f0c341a">
433
+ <data key="e_type">INCIDENT_LINK</data>
434
+ <data key="e_timestamp">1687765253</data>
435
+ <data key="e_label_binary">malicious</data>
436
+ <data key="e_label_confidence">0.7890625</data>
437
+ <data key="e_suspicion_score">0.7890625</data>
438
+ <data key="e_mo_name">Data Theft</data>
439
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
440
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
441
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
442
+ <data key="e_lifecycle_stage">complete-mission</data>
443
+ <data key="e_disposition">Disrupted</data>
444
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
445
+ </edge>
446
+ <edge id="e22" source="d7cf2414-0624-11ee-a961-f3aa8f0c341a" target="381743f2-1270-11ee-827e-818da6a5fbda">
447
+ <data key="e_type">INCIDENT_LINK</data>
448
+ <data key="e_timestamp">1687765253</data>
449
+ <data key="e_label_binary">malicious</data>
450
+ <data key="e_label_confidence">0.7890625</data>
451
+ <data key="e_suspicion_score">0.7890625</data>
452
+ <data key="e_mo_name">Data Theft</data>
453
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
454
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
455
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
456
+ <data key="e_lifecycle_stage">complete-mission</data>
457
+ <data key="e_disposition">Disrupted</data>
458
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
459
+ </edge>
460
+ <edge id="e23" source="53c44be0-0639-11ee-9501-6bd93ff6f499" target="982bc921-062f-11ee-952c-95ab55abf2b7">
461
+ <data key="e_type">INCIDENT_LINK</data>
462
+ <data key="e_timestamp">1687765253</data>
463
+ <data key="e_label_binary">malicious</data>
464
+ <data key="e_label_confidence">0.7890625</data>
465
+ <data key="e_suspicion_score">0.7890625</data>
466
+ <data key="e_mo_name">Data Theft</data>
467
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
468
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
469
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
470
+ <data key="e_lifecycle_stage">complete-mission</data>
471
+ <data key="e_disposition">Disrupted</data>
472
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
473
+ </edge>
474
+ <edge id="e24" source="982bc921-062f-11ee-952c-95ab55abf2b7" target="53c44be0-0639-11ee-9501-6bd93ff6f499">
475
+ <data key="e_type">INCIDENT_LINK</data>
476
+ <data key="e_timestamp">1687765253</data>
477
+ <data key="e_label_binary">malicious</data>
478
+ <data key="e_label_confidence">0.7890625</data>
479
+ <data key="e_suspicion_score">0.7890625</data>
480
+ <data key="e_mo_name">Data Theft</data>
481
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
482
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
483
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
484
+ <data key="e_lifecycle_stage">complete-mission</data>
485
+ <data key="e_disposition">Disrupted</data>
486
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
487
+ </edge>
488
+ <edge id="e25" source="f2d5cbe0-06bc-11ee-9979-bb10b4b96e24" target="d7cf2414-0624-11ee-a961-f3aa8f0c341a">
489
+ <data key="e_type">INCIDENT_LINK</data>
490
+ <data key="e_timestamp">1687765253</data>
491
+ <data key="e_label_binary">malicious</data>
492
+ <data key="e_label_confidence">0.7890625</data>
493
+ <data key="e_suspicion_score">0.7890625</data>
494
+ <data key="e_mo_name">Data Theft</data>
495
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
496
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
497
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
498
+ <data key="e_lifecycle_stage">complete-mission</data>
499
+ <data key="e_disposition">Disrupted</data>
500
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
501
+ </edge>
502
+ <edge id="e26" source="d7cf2414-0624-11ee-a961-f3aa8f0c341a" target="f2d5cbe0-06bc-11ee-9979-bb10b4b96e24">
503
+ <data key="e_type">INCIDENT_LINK</data>
504
+ <data key="e_timestamp">1687765253</data>
505
+ <data key="e_label_binary">malicious</data>
506
+ <data key="e_label_confidence">0.7890625</data>
507
+ <data key="e_suspicion_score">0.7890625</data>
508
+ <data key="e_mo_name">Data Theft</data>
509
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
510
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
511
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
512
+ <data key="e_lifecycle_stage">complete-mission</data>
513
+ <data key="e_disposition">Disrupted</data>
514
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
515
+ </edge>
516
+ <edge id="e27" source="ac005de2-06b0-11ee-9899-b5805856eb5f" target="HOST-12984">
517
+ <data key="e_type">INCIDENT_LINK</data>
518
+ <data key="e_timestamp">1687765253</data>
519
+ <data key="e_label_binary">malicious</data>
520
+ <data key="e_label_confidence">0.7890625</data>
521
+ <data key="e_suspicion_score">0.7890625</data>
522
+ <data key="e_mo_name">Data Theft</data>
523
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
524
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
525
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
526
+ <data key="e_lifecycle_stage">complete-mission</data>
527
+ <data key="e_disposition">Disrupted</data>
528
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
529
+ </edge>
530
+ <edge id="e28" source="HOST-12984" target="ac005de2-06b0-11ee-9899-b5805856eb5f">
531
+ <data key="e_type">INCIDENT_LINK</data>
532
+ <data key="e_timestamp">1687765253</data>
533
+ <data key="e_label_binary">malicious</data>
534
+ <data key="e_label_confidence">0.7890625</data>
535
+ <data key="e_suspicion_score">0.7890625</data>
536
+ <data key="e_mo_name">Data Theft</data>
537
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
538
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
539
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
540
+ <data key="e_lifecycle_stage">complete-mission</data>
541
+ <data key="e_disposition">Disrupted</data>
542
+ <data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
543
+ </edge>
544
+ </graph>
545
+ </graphml>
graph/incidents_graphml/c/c779f8a0-1958-11ee-b3de-e709a8260af8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="485ac321-0642-11ee-b879-8fa356303378">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.201</data>
43
+ <data key="n_hostname">100.64.71.201</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-13083" target="HOST-15047">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688357959</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c779f8a0-1958-11ee-b3de-e709a8260af8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c788a5e0-276b-11ef-b363-fdc4064c84e0.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="65fe0a20-2a4d-11ee-8fba-fd7894b61cab">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.20.130.86</data>
35
+ <data key="n_hostname">172.20.130.86</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="39cdb773-0644-11ee-8627-057c6d9a7baf">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.92.70</data>
43
+ <data key="n_hostname">100.64.92.70</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="65fe0a20-2a4d-11ee-8fba-fd7894b61cab" target="39cdb773-0644-11ee-8627-057c6d9a7baf">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1718052933</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c788a5e0-276b-11ef-b363-fdc4064c84e0</data>
61
+ </edge>
62
+ <edge id="e2" source="39cdb773-0644-11ee-8627-057c6d9a7baf" target="65fe0a20-2a4d-11ee-8fba-fd7894b61cab">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1718052933</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">c788a5e0-276b-11ef-b363-fdc4064c84e0</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/c/c7892d60-a113-11ed-b936-1349c6e38dc6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bb1f11d0-9edd-11ed-8759-7b815aa44f43">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.86.141</data>
35
+ <data key="n_hostname">100.64.86.141</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f9783d0-9d8d-11ed-8ff2-3593b92fed96">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.184.211.180</data>
43
+ <data key="n_hostname">100.64.6.51</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="bb1f11d0-9edd-11ed-8759-7b815aa44f43" target="HOST-17146">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1675134184</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c7892d60-a113-11ed-b936-1349c6e38dc6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c78c9420-ab01-11ee-ace1-1bcda4a2f9d1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c57e2685-ab01-11ee-9513-bfa421390b70">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.95.222</data>
35
+ <data key="n_hostname">100.64.95.222</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8b36c395-0626-11ee-ad14-25a724519715">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.184.211.180</data>
43
+ <data key="n_hostname">100.64.6.51</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
47
+ </node>
48
+ <edge id="e1" source="c57e2685-ab01-11ee-9513-bfa421390b70" target="HOST-17429">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1704373462</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c78c9420-ab01-11ee-ace1-1bcda4a2f9d1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c78e8490-a113-11ed-b936-1349c6e38dc6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9f9783d0-9d8d-11ed-8ff2-3593b92fed96">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.184.211.180</data>
35
+ <data key="n_hostname">100.64.6.51</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="bb1f11d0-9edd-11ed-8759-7b815aa44f43">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.86.141</data>
43
+ <data key="n_hostname">100.64.86.141</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17146" target="HOST-17195">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1675134184</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c78e8490-a113-11ed-b936-1349c6e38dc6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c7a0fc90-8d5f-11ee-9951-411438339097.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="fff5e732-26d1-11ee-b20b-598a61e4a387">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.9.187</data>
35
+ <data key="n_hostname">100.64.9.187</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.49375</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="c2d811c4-72a3-11ee-b250-3f44308bc5b2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.20</data>
43
+ <data key="n_hostname">100.64.68.20</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="fff5e732-26d1-11ee-b20b-598a61e4a387" target="c2d811c4-72a3-11ee-b250-3f44308bc5b2">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701115300</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.6625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c7a0fc90-8d5f-11ee-9951-411438339097</data>
61
+ </edge>
62
+ <edge id="e2" source="c2d811c4-72a3-11ee-b250-3f44308bc5b2" target="fff5e732-26d1-11ee-b20b-598a61e4a387">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1701115300</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.6625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">c7a0fc90-8d5f-11ee-9951-411438339097</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/c/c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8b36c395-0626-11ee-ad14-25a724519715">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.184.211.180</data>
35
+ <data key="n_hostname">100.64.6.51</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="c57e2685-ab01-11ee-9513-bfa421390b70">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.95.222</data>
43
+ <data key="n_hostname">100.64.95.222</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17429" target="HOST-18913">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1704373462</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c7a91ef0-1958-11ee-b3de-e709a8260af8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4d4706e2-0643-11ee-a1c0-af40b19a49a7">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.78.244</data>
35
+ <data key="n_hostname">100.64.78.244</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="4d4706e2-0643-11ee-a1c0-af40b19a49a7" target="HOST-13083">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688357959</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c7a91ef0-1958-11ee-b3de-e709a8260af8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c7b0b290-2701-11ed-bc1f-0928ad8774f3.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b8482ab7-f360-11ec-a2fa-2b3ef270b4f7">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.18.10.137</data>
35
+ <data key="n_hostname">172.18.10.137</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="e7036e4a-fe60-11ec-945a-9d18e441551f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.85.108</data>
43
+ <data key="n_hostname">100.64.85.108</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="b8482ab7-f360-11ec-a2fa-2b3ef270b4f7" target="e7036e4a-fe60-11ec-945a-9d18e441551f">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1661712411</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.4375</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c7b0b290-2701-11ed-bc1f-0928ad8774f3</data>
61
+ </edge>
62
+ <edge id="e2" source="e7036e4a-fe60-11ec-945a-9d18e441551f" target="b8482ab7-f360-11ec-a2fa-2b3ef270b4f7">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1661712411</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.4375</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">c7b0b290-2701-11ed-bc1f-0928ad8774f3</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/c/c7b63020-0b80-11ef-b87c-0d8b17cd9fbf.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2fae4744-1248-11ee-9633-0bc37fed8e1a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.17.248</data>
35
+ <data key="n_hostname">100.64.17.248</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9ff29330-0627-11ee-ad14-25a724519715">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
47
+ </node>
48
+ <node id="a8e1aa11-2d02-11ee-abcd-a338ffca27fd">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.94.161</data>
51
+ <data key="n_hostname">USER-0015-2120.example.internal</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
55
+ </node>
56
+ <edge id="e1" source="2fae4744-1248-11ee-9633-0bc37fed8e1a" target="HOST-16999">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1714983320</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">c7b63020-0b80-11ef-b87c-0d8b17cd9fbf</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-16999" target="2fae4744-1248-11ee-9633-0bc37fed8e1a">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1714983320</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">c7b63020-0b80-11ef-b87c-0d8b17cd9fbf</data>
83
+ </edge>
84
+ <edge id="e3" source="a8e1aa11-2d02-11ee-abcd-a338ffca27fd" target="HOST-16999">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1714983320</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.7</data>
89
+ <data key="e_suspicion_score">0.25</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Unprocessed</data>
96
+ <data key="e_incident_id">c7b63020-0b80-11ef-b87c-0d8b17cd9fbf</data>
97
+ </edge>
98
+ <edge id="e4" source="HOST-16999" target="a8e1aa11-2d02-11ee-abcd-a338ffca27fd">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1714983320</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.7</data>
103
+ <data key="e_suspicion_score">0.25</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Unprocessed</data>
110
+ <data key="e_incident_id">c7b63020-0b80-11ef-b87c-0d8b17cd9fbf</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/c/c7b6da90-33da-11ed-bcaf-e3fcd610a254.graphml ADDED
@@ -0,0 +1,783 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ef6bf530-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.72.77</data>
35
+ <data key="n_hostname">100.64.72.77</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="def619a1-026b-11ed-9955-cd1e11715b9d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.73.21</data>
43
+ <data key="n_hostname">100.64.73.21</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.930390625</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="c220b891-32e4-11ed-bd62-35a35d83109f">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.82.81</data>
51
+ <data key="n_hostname">100.64.82.81</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="f92ff530-ea91-11ec-abf7-619673fe2558">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.72.109</data>
59
+ <data key="n_hostname">100.64.72.109</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.841796875</data>
62
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
63
+ </node>
64
+ <node id="6f035ac4-33c8-11ed-bfee-7f21394fcb29">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.82.82</data>
67
+ <data key="n_hostname">100.64.82.82</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <node id="66a42b01-032d-11ed-87c7-811af63692d8">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.82.83</data>
75
+ <data key="n_hostname">100.64.82.83</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.4375</data>
78
+ <data key="n_products">["Precinct","Meraki"]</data>
79
+ </node>
80
+ <node id="e510be40-ea91-11ec-90c7-eff83c975df3">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.73.72</data>
83
+ <data key="n_hostname">100.64.73.72</data>
84
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
87
+ </node>
88
+ <node id="d489b512-14c9-11ed-a4d8-07ba3f20e566">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.77.103</data>
91
+ <data key="n_hostname">100.64.77.103</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.4375</data>
94
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
95
+ </node>
96
+ <node id="f7b3dc80-ea91-11ec-abf7-619673fe2558">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.73.51</data>
99
+ <data key="n_hostname">100.64.73.51</data>
100
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
103
+ </node>
104
+ <node id="561723a2-19b7-11ed-88a2-8f534cb727b0">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.82.84</data>
107
+ <data key="n_hostname">100.64.82.84</data>
108
+ <data key="n_set_roles">["Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.68359375</data>
110
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
111
+ </node>
112
+ <node id="e3599860-ea91-11ec-90c7-eff83c975df3">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.72.118</data>
115
+ <data key="n_hostname">100.64.72.118</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.71875</data>
118
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
119
+ </node>
120
+ <node id="f62d3c80-ea91-11ec-abf7-619673fe2558">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.71.237</data>
123
+ <data key="n_hostname">100.64.71.237</data>
124
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.71875</data>
126
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
127
+ </node>
128
+ <node id="6e8709d1-09ce-11ed-8433-8d9635f8f09c">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.82.85</data>
131
+ <data key="n_hostname">100.64.82.85</data>
132
+ <data key="n_set_roles">["Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.4375</data>
134
+ <data key="n_products">["Precinct","Meraki"]</data>
135
+ </node>
136
+ <node id="6b83a6d4-eb6f-11ec-97c9-c14f7cc7e2b1">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.82.86</data>
139
+ <data key="n_hostname">100.64.82.86</data>
140
+ <data key="n_set_roles">["Exploiting Host"]</data>
141
+ <data key="n_suspicion_score">0.578125</data>
142
+ <data key="n_products">["Precinct","Meraki"]</data>
143
+ </node>
144
+ <node id="3eab20d0-ea92-11ec-90c7-eff83c975df3">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.71.238</data>
147
+ <data key="n_hostname">100.64.71.238</data>
148
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.841796875</data>
150
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
151
+ </node>
152
+ <node id="d9411f85-29fa-11ed-b223-bddde7e3fc8b">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.82.87</data>
155
+ <data key="n_hostname">100.64.82.87</data>
156
+ <data key="n_set_roles">["Exploiting Host"]</data>
157
+ <data key="n_suspicion_score">0.4375</data>
158
+ <data key="n_products">["Precinct","Meraki"]</data>
159
+ </node>
160
+ <node id="d1b88ba0-ec64-11ec-bd01-f7823eb190cd">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.82.88</data>
163
+ <data key="n_hostname">100.64.82.88</data>
164
+ <data key="n_set_roles">["Exploiting Host"]</data>
165
+ <data key="n_suspicion_score">0.578125</data>
166
+ <data key="n_products">["Precinct","Meraki"]</data>
167
+ </node>
168
+ <node id="ccb6e861-267d-11ed-a281-c1fab458b95d">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">100.64.82.89</data>
171
+ <data key="n_hostname">100.64.82.89</data>
172
+ <data key="n_set_roles">["Exploiting Host"]</data>
173
+ <data key="n_suspicion_score">0.578125</data>
174
+ <data key="n_products">["Precinct","Meraki"]</data>
175
+ </node>
176
+ <node id="084aa654-32db-11ed-a658-6738815b545a">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">100.64.82.90</data>
179
+ <data key="n_hostname">100.64.82.90</data>
180
+ <data key="n_set_roles">["Exploiting Host"]</data>
181
+ <data key="n_suspicion_score">0.578125</data>
182
+ <data key="n_products">["Precinct","Meraki"]</data>
183
+ </node>
184
+ <node id="e6990751-0d40-11ed-9b66-1fa3f6da16ca">
185
+ <data key="n_type">HOST</data>
186
+ <data key="n_ip">100.64.72.73</data>
187
+ <data key="n_hostname">100.64.72.73</data>
188
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
189
+ <data key="n_suspicion_score">0.841796875</data>
190
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
191
+ </node>
192
+ <node id="2f07c422-33c7-11ed-bfee-7f21394fcb29">
193
+ <data key="n_type">HOST</data>
194
+ <data key="n_ip">100.64.82.91</data>
195
+ <data key="n_hostname">100.64.82.91</data>
196
+ <data key="n_set_roles">["Exploiting Host"]</data>
197
+ <data key="n_suspicion_score">0.578125</data>
198
+ <data key="n_products">["Precinct","Meraki"]</data>
199
+ </node>
200
+ <node id="c03bc4b2-33d0-11ed-8138-e78ae9325a59">
201
+ <data key="n_type">HOST</data>
202
+ <data key="n_ip">100.64.82.92</data>
203
+ <data key="n_hostname">100.64.82.92</data>
204
+ <data key="n_set_roles">["Exploiting Host"]</data>
205
+ <data key="n_suspicion_score">0.578125</data>
206
+ <data key="n_products">["Precinct","Meraki"]</data>
207
+ </node>
208
+ <edge id="e1" source="HOST-12865" target="HOST-13202">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1663125026</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.930390625</data>
213
+ <data key="e_suspicion_score">0.930390625</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Disrupted</data>
220
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
221
+ </edge>
222
+ <edge id="e2" source="c220b891-32e4-11ed-bd62-35a35d83109f" target="HOST-14542">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1663125026</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.930390625</data>
227
+ <data key="e_suspicion_score">0.930390625</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Disrupted</data>
234
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
235
+ </edge>
236
+ <edge id="e3" source="HOST-14542" target="c220b891-32e4-11ed-bd62-35a35d83109f">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1663125026</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.930390625</data>
241
+ <data key="e_suspicion_score">0.930390625</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Disrupted</data>
248
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
249
+ </edge>
250
+ <edge id="e4" source="6f035ac4-33c8-11ed-bfee-7f21394fcb29" target="HOST-14542">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1663125026</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.930390625</data>
255
+ <data key="e_suspicion_score">0.930390625</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Disrupted</data>
262
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
263
+ </edge>
264
+ <edge id="e5" source="HOST-14542" target="6f035ac4-33c8-11ed-bfee-7f21394fcb29">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1663125026</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.930390625</data>
269
+ <data key="e_suspicion_score">0.930390625</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Disrupted</data>
276
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
277
+ </edge>
278
+ <edge id="e6" source="HOST-13202" target="HOST-14542">
279
+ <data key="e_type">INCIDENT_LINK</data>
280
+ <data key="e_timestamp">1663125026</data>
281
+ <data key="e_label_binary">malicious</data>
282
+ <data key="e_label_confidence">0.930390625</data>
283
+ <data key="e_suspicion_score">0.930390625</data>
284
+ <data key="e_mo_name">Data Theft</data>
285
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
286
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
287
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
288
+ <data key="e_lifecycle_stage">complete-mission</data>
289
+ <data key="e_disposition">Disrupted</data>
290
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
291
+ </edge>
292
+ <edge id="e7" source="HOST-14542" target="HOST-13202">
293
+ <data key="e_type">INCIDENT_LINK</data>
294
+ <data key="e_timestamp">1663125026</data>
295
+ <data key="e_label_binary">malicious</data>
296
+ <data key="e_label_confidence">0.930390625</data>
297
+ <data key="e_suspicion_score">0.930390625</data>
298
+ <data key="e_mo_name">Data Theft</data>
299
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
300
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
301
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
302
+ <data key="e_lifecycle_stage">complete-mission</data>
303
+ <data key="e_disposition">Disrupted</data>
304
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
305
+ </edge>
306
+ <edge id="e8" source="66a42b01-032d-11ed-87c7-811af63692d8" target="HOST-13775">
307
+ <data key="e_type">INCIDENT_LINK</data>
308
+ <data key="e_timestamp">1663125026</data>
309
+ <data key="e_label_binary">malicious</data>
310
+ <data key="e_label_confidence">0.930390625</data>
311
+ <data key="e_suspicion_score">0.930390625</data>
312
+ <data key="e_mo_name">Data Theft</data>
313
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
314
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
315
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
316
+ <data key="e_lifecycle_stage">complete-mission</data>
317
+ <data key="e_disposition">Disrupted</data>
318
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
319
+ </edge>
320
+ <edge id="e9" source="HOST-13775" target="66a42b01-032d-11ed-87c7-811af63692d8">
321
+ <data key="e_type">INCIDENT_LINK</data>
322
+ <data key="e_timestamp">1663125026</data>
323
+ <data key="e_label_binary">malicious</data>
324
+ <data key="e_label_confidence">0.930390625</data>
325
+ <data key="e_suspicion_score">0.930390625</data>
326
+ <data key="e_mo_name">Data Theft</data>
327
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
328
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
329
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
330
+ <data key="e_lifecycle_stage">complete-mission</data>
331
+ <data key="e_disposition">Disrupted</data>
332
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
333
+ </edge>
334
+ <edge id="e10" source="HOST-14483" target="HOST-13208">
335
+ <data key="e_type">INCIDENT_LINK</data>
336
+ <data key="e_timestamp">1663125026</data>
337
+ <data key="e_label_binary">malicious</data>
338
+ <data key="e_label_confidence">0.930390625</data>
339
+ <data key="e_suspicion_score">0.930390625</data>
340
+ <data key="e_mo_name">Data Theft</data>
341
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
342
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
343
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
344
+ <data key="e_lifecycle_stage">complete-mission</data>
345
+ <data key="e_disposition">Disrupted</data>
346
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
347
+ </edge>
348
+ <edge id="e11" source="HOST-13208" target="HOST-14483">
349
+ <data key="e_type">INCIDENT_LINK</data>
350
+ <data key="e_timestamp">1663125026</data>
351
+ <data key="e_label_binary">malicious</data>
352
+ <data key="e_label_confidence">0.930390625</data>
353
+ <data key="e_suspicion_score">0.930390625</data>
354
+ <data key="e_mo_name">Data Theft</data>
355
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
356
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
357
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
358
+ <data key="e_lifecycle_stage">complete-mission</data>
359
+ <data key="e_disposition">Disrupted</data>
360
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
361
+ </edge>
362
+ <edge id="e12" source="561723a2-19b7-11ed-88a2-8f534cb727b0" target="HOST-13208">
363
+ <data key="e_type">INCIDENT_LINK</data>
364
+ <data key="e_timestamp">1663125026</data>
365
+ <data key="e_label_binary">malicious</data>
366
+ <data key="e_label_confidence">0.930390625</data>
367
+ <data key="e_suspicion_score">0.930390625</data>
368
+ <data key="e_mo_name">Data Theft</data>
369
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
370
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
371
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
372
+ <data key="e_lifecycle_stage">complete-mission</data>
373
+ <data key="e_disposition">Disrupted</data>
374
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
375
+ </edge>
376
+ <edge id="e13" source="HOST-13208" target="561723a2-19b7-11ed-88a2-8f534cb727b0">
377
+ <data key="e_type">INCIDENT_LINK</data>
378
+ <data key="e_timestamp">1663125026</data>
379
+ <data key="e_label_binary">malicious</data>
380
+ <data key="e_label_confidence">0.930390625</data>
381
+ <data key="e_suspicion_score">0.930390625</data>
382
+ <data key="e_mo_name">Data Theft</data>
383
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
384
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
385
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
386
+ <data key="e_lifecycle_stage">complete-mission</data>
387
+ <data key="e_disposition">Disrupted</data>
388
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
389
+ </edge>
390
+ <edge id="e14" source="561723a2-19b7-11ed-88a2-8f534cb727b0" target="HOST-14549">
391
+ <data key="e_type">INCIDENT_LINK</data>
392
+ <data key="e_timestamp">1663125026</data>
393
+ <data key="e_label_binary">malicious</data>
394
+ <data key="e_label_confidence">0.930390625</data>
395
+ <data key="e_suspicion_score">0.930390625</data>
396
+ <data key="e_mo_name">Data Theft</data>
397
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
398
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
399
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
400
+ <data key="e_lifecycle_stage">complete-mission</data>
401
+ <data key="e_disposition">Disrupted</data>
402
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
403
+ </edge>
404
+ <edge id="e15" source="HOST-14549" target="561723a2-19b7-11ed-88a2-8f534cb727b0">
405
+ <data key="e_type">INCIDENT_LINK</data>
406
+ <data key="e_timestamp">1663125026</data>
407
+ <data key="e_label_binary">malicious</data>
408
+ <data key="e_label_confidence">0.930390625</data>
409
+ <data key="e_suspicion_score">0.930390625</data>
410
+ <data key="e_mo_name">Data Theft</data>
411
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
412
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
413
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
414
+ <data key="e_lifecycle_stage">complete-mission</data>
415
+ <data key="e_disposition">Disrupted</data>
416
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
417
+ </edge>
418
+ <edge id="e16" source="561723a2-19b7-11ed-88a2-8f534cb727b0" target="HOST-12780">
419
+ <data key="e_type">INCIDENT_LINK</data>
420
+ <data key="e_timestamp">1663125026</data>
421
+ <data key="e_label_binary">malicious</data>
422
+ <data key="e_label_confidence">0.930390625</data>
423
+ <data key="e_suspicion_score">0.930390625</data>
424
+ <data key="e_mo_name">Data Theft</data>
425
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
426
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
427
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
428
+ <data key="e_lifecycle_stage">complete-mission</data>
429
+ <data key="e_disposition">Disrupted</data>
430
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
431
+ </edge>
432
+ <edge id="e17" source="HOST-12780" target="561723a2-19b7-11ed-88a2-8f534cb727b0">
433
+ <data key="e_type">INCIDENT_LINK</data>
434
+ <data key="e_timestamp">1663125026</data>
435
+ <data key="e_label_binary">malicious</data>
436
+ <data key="e_label_confidence">0.930390625</data>
437
+ <data key="e_suspicion_score">0.930390625</data>
438
+ <data key="e_mo_name">Data Theft</data>
439
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
440
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
441
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
442
+ <data key="e_lifecycle_stage">complete-mission</data>
443
+ <data key="e_disposition">Disrupted</data>
444
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
445
+ </edge>
446
+ <edge id="e18" source="66a42b01-032d-11ed-87c7-811af63692d8" target="HOST-12780">
447
+ <data key="e_type">INCIDENT_LINK</data>
448
+ <data key="e_timestamp">1663125026</data>
449
+ <data key="e_label_binary">malicious</data>
450
+ <data key="e_label_confidence">0.930390625</data>
451
+ <data key="e_suspicion_score">0.930390625</data>
452
+ <data key="e_mo_name">Data Theft</data>
453
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
454
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
455
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
456
+ <data key="e_lifecycle_stage">complete-mission</data>
457
+ <data key="e_disposition">Disrupted</data>
458
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
459
+ </edge>
460
+ <edge id="e19" source="HOST-12780" target="66a42b01-032d-11ed-87c7-811af63692d8">
461
+ <data key="e_type">INCIDENT_LINK</data>
462
+ <data key="e_timestamp">1663125026</data>
463
+ <data key="e_label_binary">malicious</data>
464
+ <data key="e_label_confidence">0.930390625</data>
465
+ <data key="e_suspicion_score">0.930390625</data>
466
+ <data key="e_mo_name">Data Theft</data>
467
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
468
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
469
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
470
+ <data key="e_lifecycle_stage">complete-mission</data>
471
+ <data key="e_disposition">Disrupted</data>
472
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
473
+ </edge>
474
+ <edge id="e20" source="HOST-13202" target="HOST-14549">
475
+ <data key="e_type">INCIDENT_LINK</data>
476
+ <data key="e_timestamp">1663125026</data>
477
+ <data key="e_label_binary">malicious</data>
478
+ <data key="e_label_confidence">0.930390625</data>
479
+ <data key="e_suspicion_score">0.930390625</data>
480
+ <data key="e_mo_name">Data Theft</data>
481
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
482
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
483
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
484
+ <data key="e_lifecycle_stage">complete-mission</data>
485
+ <data key="e_disposition">Disrupted</data>
486
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
487
+ </edge>
488
+ <edge id="e21" source="HOST-14549" target="HOST-13202">
489
+ <data key="e_type">INCIDENT_LINK</data>
490
+ <data key="e_timestamp">1663125026</data>
491
+ <data key="e_label_binary">malicious</data>
492
+ <data key="e_label_confidence">0.930390625</data>
493
+ <data key="e_suspicion_score">0.930390625</data>
494
+ <data key="e_mo_name">Data Theft</data>
495
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
496
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
497
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
498
+ <data key="e_lifecycle_stage">complete-mission</data>
499
+ <data key="e_disposition">Disrupted</data>
500
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
501
+ </edge>
502
+ <edge id="e22" source="6e8709d1-09ce-11ed-8433-8d9635f8f09c" target="HOST-14542">
503
+ <data key="e_type">INCIDENT_LINK</data>
504
+ <data key="e_timestamp">1663125026</data>
505
+ <data key="e_label_binary">malicious</data>
506
+ <data key="e_label_confidence">0.930390625</data>
507
+ <data key="e_suspicion_score">0.930390625</data>
508
+ <data key="e_mo_name">Data Theft</data>
509
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
510
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
511
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
512
+ <data key="e_lifecycle_stage">complete-mission</data>
513
+ <data key="e_disposition">Disrupted</data>
514
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
515
+ </edge>
516
+ <edge id="e23" source="HOST-14542" target="6e8709d1-09ce-11ed-8433-8d9635f8f09c">
517
+ <data key="e_type">INCIDENT_LINK</data>
518
+ <data key="e_timestamp">1663125026</data>
519
+ <data key="e_label_binary">malicious</data>
520
+ <data key="e_label_confidence">0.930390625</data>
521
+ <data key="e_suspicion_score">0.930390625</data>
522
+ <data key="e_mo_name">Data Theft</data>
523
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
524
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
525
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
526
+ <data key="e_lifecycle_stage">complete-mission</data>
527
+ <data key="e_disposition">Disrupted</data>
528
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
529
+ </edge>
530
+ <edge id="e24" source="6b83a6d4-eb6f-11ec-97c9-c14f7cc7e2b1" target="HOST-12782">
531
+ <data key="e_type">INCIDENT_LINK</data>
532
+ <data key="e_timestamp">1663125026</data>
533
+ <data key="e_label_binary">malicious</data>
534
+ <data key="e_label_confidence">0.930390625</data>
535
+ <data key="e_suspicion_score">0.930390625</data>
536
+ <data key="e_mo_name">Data Theft</data>
537
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
538
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
539
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
540
+ <data key="e_lifecycle_stage">complete-mission</data>
541
+ <data key="e_disposition">Disrupted</data>
542
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
543
+ </edge>
544
+ <edge id="e25" source="HOST-12782" target="6b83a6d4-eb6f-11ec-97c9-c14f7cc7e2b1">
545
+ <data key="e_type">INCIDENT_LINK</data>
546
+ <data key="e_timestamp">1663125026</data>
547
+ <data key="e_label_binary">malicious</data>
548
+ <data key="e_label_confidence">0.930390625</data>
549
+ <data key="e_suspicion_score">0.930390625</data>
550
+ <data key="e_mo_name">Data Theft</data>
551
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
552
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
553
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
554
+ <data key="e_lifecycle_stage">complete-mission</data>
555
+ <data key="e_disposition">Disrupted</data>
556
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
557
+ </edge>
558
+ <edge id="e26" source="d9411f85-29fa-11ed-b223-bddde7e3fc8b" target="HOST-12782">
559
+ <data key="e_type">INCIDENT_LINK</data>
560
+ <data key="e_timestamp">1663125026</data>
561
+ <data key="e_label_binary">malicious</data>
562
+ <data key="e_label_confidence">0.930390625</data>
563
+ <data key="e_suspicion_score">0.930390625</data>
564
+ <data key="e_mo_name">Data Theft</data>
565
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
566
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
567
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
568
+ <data key="e_lifecycle_stage">complete-mission</data>
569
+ <data key="e_disposition">Disrupted</data>
570
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
571
+ </edge>
572
+ <edge id="e27" source="HOST-12782" target="d9411f85-29fa-11ed-b223-bddde7e3fc8b">
573
+ <data key="e_type">INCIDENT_LINK</data>
574
+ <data key="e_timestamp">1663125026</data>
575
+ <data key="e_label_binary">malicious</data>
576
+ <data key="e_label_confidence">0.930390625</data>
577
+ <data key="e_suspicion_score">0.930390625</data>
578
+ <data key="e_mo_name">Data Theft</data>
579
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
580
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
581
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
582
+ <data key="e_lifecycle_stage">complete-mission</data>
583
+ <data key="e_disposition">Disrupted</data>
584
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
585
+ </edge>
586
+ <edge id="e28" source="d1b88ba0-ec64-11ec-bd01-f7823eb190cd" target="HOST-12782">
587
+ <data key="e_type">INCIDENT_LINK</data>
588
+ <data key="e_timestamp">1663125026</data>
589
+ <data key="e_label_binary">malicious</data>
590
+ <data key="e_label_confidence">0.930390625</data>
591
+ <data key="e_suspicion_score">0.930390625</data>
592
+ <data key="e_mo_name">Data Theft</data>
593
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
594
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
595
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
596
+ <data key="e_lifecycle_stage">complete-mission</data>
597
+ <data key="e_disposition">Disrupted</data>
598
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
599
+ </edge>
600
+ <edge id="e29" source="HOST-12782" target="d1b88ba0-ec64-11ec-bd01-f7823eb190cd">
601
+ <data key="e_type">INCIDENT_LINK</data>
602
+ <data key="e_timestamp">1663125026</data>
603
+ <data key="e_label_binary">malicious</data>
604
+ <data key="e_label_confidence">0.930390625</data>
605
+ <data key="e_suspicion_score">0.930390625</data>
606
+ <data key="e_mo_name">Data Theft</data>
607
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
608
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
609
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
610
+ <data key="e_lifecycle_stage">complete-mission</data>
611
+ <data key="e_disposition">Disrupted</data>
612
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
613
+ </edge>
614
+ <edge id="e30" source="HOST-13202" target="HOST-12782">
615
+ <data key="e_type">INCIDENT_LINK</data>
616
+ <data key="e_timestamp">1663125026</data>
617
+ <data key="e_label_binary">malicious</data>
618
+ <data key="e_label_confidence">0.930390625</data>
619
+ <data key="e_suspicion_score">0.930390625</data>
620
+ <data key="e_mo_name">Data Theft</data>
621
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
622
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
623
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
624
+ <data key="e_lifecycle_stage">complete-mission</data>
625
+ <data key="e_disposition">Disrupted</data>
626
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
627
+ </edge>
628
+ <edge id="e31" source="HOST-12782" target="HOST-13202">
629
+ <data key="e_type">INCIDENT_LINK</data>
630
+ <data key="e_timestamp">1663125026</data>
631
+ <data key="e_label_binary">malicious</data>
632
+ <data key="e_label_confidence">0.930390625</data>
633
+ <data key="e_suspicion_score">0.930390625</data>
634
+ <data key="e_mo_name">Data Theft</data>
635
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
636
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
637
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
638
+ <data key="e_lifecycle_stage">complete-mission</data>
639
+ <data key="e_disposition">Disrupted</data>
640
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
641
+ </edge>
642
+ <edge id="e32" source="ccb6e861-267d-11ed-a281-c1fab458b95d" target="HOST-13775">
643
+ <data key="e_type">INCIDENT_LINK</data>
644
+ <data key="e_timestamp">1663125026</data>
645
+ <data key="e_label_binary">malicious</data>
646
+ <data key="e_label_confidence">0.930390625</data>
647
+ <data key="e_suspicion_score">0.930390625</data>
648
+ <data key="e_mo_name">Data Theft</data>
649
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
650
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
651
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
652
+ <data key="e_lifecycle_stage">complete-mission</data>
653
+ <data key="e_disposition">Disrupted</data>
654
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
655
+ </edge>
656
+ <edge id="e33" source="HOST-13775" target="ccb6e861-267d-11ed-a281-c1fab458b95d">
657
+ <data key="e_type">INCIDENT_LINK</data>
658
+ <data key="e_timestamp">1663125026</data>
659
+ <data key="e_label_binary">malicious</data>
660
+ <data key="e_label_confidence">0.930390625</data>
661
+ <data key="e_suspicion_score">0.930390625</data>
662
+ <data key="e_mo_name">Data Theft</data>
663
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
664
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
665
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
666
+ <data key="e_lifecycle_stage">complete-mission</data>
667
+ <data key="e_disposition">Disrupted</data>
668
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
669
+ </edge>
670
+ <edge id="e34" source="084aa654-32db-11ed-a658-6738815b545a" target="HOST-14095">
671
+ <data key="e_type">INCIDENT_LINK</data>
672
+ <data key="e_timestamp">1663125026</data>
673
+ <data key="e_label_binary">malicious</data>
674
+ <data key="e_label_confidence">0.930390625</data>
675
+ <data key="e_suspicion_score">0.930390625</data>
676
+ <data key="e_mo_name">Data Theft</data>
677
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
678
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
679
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
680
+ <data key="e_lifecycle_stage">complete-mission</data>
681
+ <data key="e_disposition">Disrupted</data>
682
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
683
+ </edge>
684
+ <edge id="e35" source="HOST-14095" target="084aa654-32db-11ed-a658-6738815b545a">
685
+ <data key="e_type">INCIDENT_LINK</data>
686
+ <data key="e_timestamp">1663125026</data>
687
+ <data key="e_label_binary">malicious</data>
688
+ <data key="e_label_confidence">0.930390625</data>
689
+ <data key="e_suspicion_score">0.930390625</data>
690
+ <data key="e_mo_name">Data Theft</data>
691
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
692
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
693
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
694
+ <data key="e_lifecycle_stage">complete-mission</data>
695
+ <data key="e_disposition">Disrupted</data>
696
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
697
+ </edge>
698
+ <edge id="e36" source="2f07c422-33c7-11ed-bfee-7f21394fcb29" target="HOST-14095">
699
+ <data key="e_type">INCIDENT_LINK</data>
700
+ <data key="e_timestamp">1663125026</data>
701
+ <data key="e_label_binary">malicious</data>
702
+ <data key="e_label_confidence">0.930390625</data>
703
+ <data key="e_suspicion_score">0.930390625</data>
704
+ <data key="e_mo_name">Data Theft</data>
705
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
706
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
707
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
708
+ <data key="e_lifecycle_stage">complete-mission</data>
709
+ <data key="e_disposition">Disrupted</data>
710
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
711
+ </edge>
712
+ <edge id="e37" source="HOST-14095" target="2f07c422-33c7-11ed-bfee-7f21394fcb29">
713
+ <data key="e_type">INCIDENT_LINK</data>
714
+ <data key="e_timestamp">1663125026</data>
715
+ <data key="e_label_binary">malicious</data>
716
+ <data key="e_label_confidence">0.930390625</data>
717
+ <data key="e_suspicion_score">0.930390625</data>
718
+ <data key="e_mo_name">Data Theft</data>
719
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
720
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
721
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
722
+ <data key="e_lifecycle_stage">complete-mission</data>
723
+ <data key="e_disposition">Disrupted</data>
724
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
725
+ </edge>
726
+ <edge id="e38" source="c03bc4b2-33d0-11ed-8138-e78ae9325a59" target="HOST-14095">
727
+ <data key="e_type">INCIDENT_LINK</data>
728
+ <data key="e_timestamp">1663125026</data>
729
+ <data key="e_label_binary">malicious</data>
730
+ <data key="e_label_confidence">0.930390625</data>
731
+ <data key="e_suspicion_score">0.930390625</data>
732
+ <data key="e_mo_name">Data Theft</data>
733
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
734
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
735
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
736
+ <data key="e_lifecycle_stage">complete-mission</data>
737
+ <data key="e_disposition">Disrupted</data>
738
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
739
+ </edge>
740
+ <edge id="e39" source="HOST-14095" target="c03bc4b2-33d0-11ed-8138-e78ae9325a59">
741
+ <data key="e_type">INCIDENT_LINK</data>
742
+ <data key="e_timestamp">1663125026</data>
743
+ <data key="e_label_binary">malicious</data>
744
+ <data key="e_label_confidence">0.930390625</data>
745
+ <data key="e_suspicion_score">0.930390625</data>
746
+ <data key="e_mo_name">Data Theft</data>
747
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
748
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
749
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
750
+ <data key="e_lifecycle_stage">complete-mission</data>
751
+ <data key="e_disposition">Disrupted</data>
752
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
753
+ </edge>
754
+ <edge id="e40" source="561723a2-19b7-11ed-88a2-8f534cb727b0" target="HOST-14095">
755
+ <data key="e_type">INCIDENT_LINK</data>
756
+ <data key="e_timestamp">1663125026</data>
757
+ <data key="e_label_binary">malicious</data>
758
+ <data key="e_label_confidence">0.930390625</data>
759
+ <data key="e_suspicion_score">0.930390625</data>
760
+ <data key="e_mo_name">Data Theft</data>
761
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
762
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
763
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
764
+ <data key="e_lifecycle_stage">complete-mission</data>
765
+ <data key="e_disposition">Disrupted</data>
766
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
767
+ </edge>
768
+ <edge id="e41" source="HOST-14095" target="561723a2-19b7-11ed-88a2-8f534cb727b0">
769
+ <data key="e_type">INCIDENT_LINK</data>
770
+ <data key="e_timestamp">1663125026</data>
771
+ <data key="e_label_binary">malicious</data>
772
+ <data key="e_label_confidence">0.930390625</data>
773
+ <data key="e_suspicion_score">0.930390625</data>
774
+ <data key="e_mo_name">Data Theft</data>
775
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
776
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
777
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
778
+ <data key="e_lifecycle_stage">complete-mission</data>
779
+ <data key="e_disposition">Disrupted</data>
780
+ <data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
781
+ </edge>
782
+ </graph>
783
+ </graphml>
graph/incidents_graphml/c/c7d05e10-0725-11ee-9ff8-05edc9624e6c.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="61a43cc1-0639-11ee-8434-e720bc5c09e1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">192.168.233.197</data>
35
+ <data key="n_hostname">192.168.233.197</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="33ee47d1-0648-11ee-b879-8fa356303378">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.203</data>
43
+ <data key="n_hostname">100.64.72.203</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="61a43cc1-0639-11ee-8434-e720bc5c09e1" target="33ee47d1-0648-11ee-b879-8fa356303378">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686356934</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c7d05e10-0725-11ee-9ff8-05edc9624e6c</data>
61
+ </edge>
62
+ <edge id="e2" source="33ee47d1-0648-11ee-b879-8fa356303378" target="61a43cc1-0639-11ee-8434-e720bc5c09e1">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1686356934</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">c7d05e10-0725-11ee-9ff8-05edc9624e6c</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/c/c7d0cb30-1958-11ee-b3de-e709a8260af8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="4d4706e2-0643-11ee-a1c0-af40b19a49a7">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.78.244</data>
43
+ <data key="n_hostname">100.64.78.244</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-13083" target="HOST-15048">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688357959</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c7d0cb30-1958-11ee-b3de-e709a8260af8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c7e05460-73d5-11ee-9478-f721b34a9cef.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f39692d2-62dd-11ee-b5a9-19b7e687c7ca">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.187</data>
35
+ <data key="n_hostname">100.64.18.187</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.168.48</data>
43
+ <data key="n_hostname">172.30.168.48</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4295" target="HOST-2842">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698307251</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c7e05460-73d5-11ee-9478-f721b34a9cef</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c7e0f950-ddd0-11ee-a342-9d44f1915d3d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="346b02a0-062c-11ee-9897-5fbc3597a39b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.54.31</data>
35
+ <data key="n_hostname">100.64.54.31</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.158.1</data>
43
+ <data key="n_hostname">172.29.158.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-9336" target="HOST-2858">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1709959927</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c7e0f950-ddd0-11ee-a342-9d44f1915d3d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c7e17d30-3d6c-11ee-b209-c721199fad49.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.27.202.53</data>
35
+ <data key="n_hostname">172.27.202.53</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="897e8c40-0626-11ee-8794-6bae0a4a6dd8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.11.152</data>
43
+ <data key="n_hostname">100.64.11.152</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2703" target="HOST-3315">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692324791</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c7e17d30-3d6c-11ee-b209-c721199fad49</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c7e4c860-1958-11ee-b3de-e709a8260af8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8814f1b1-0648-11ee-9488-69c5977d12da">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.78.245</data>
35
+ <data key="n_hostname">100.64.78.245</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="8814f1b1-0648-11ee-9488-69c5977d12da" target="HOST-13083">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688357959</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c7e4c860-1958-11ee-b3de-e709a8260af8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c7e82540-5789-11ee-b4dd-e56c30c12cd4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.182.227</data>
35
+ <data key="n_hostname">172.31.182.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c02fe7b2-5500-11ee-9640-f5c687ccca23">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.57.50</data>
43
+ <data key="n_hostname">100.64.57.50</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2761" target="c02fe7b2-5500-11ee-9640-f5c687ccca23">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695195977</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">c7e82540-5789-11ee-b4dd-e56c30c12cd4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/c/c7ea0b00-0373-11ed-8991-41244357ae3d.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="546ccad0-eb5b-11ec-b578-7bb4b206dd31">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.115</data>
35
+ <data key="n_hostname">100.64.68.115</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="e1db83e0-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.1.109</data>
43
+ <data key="n_hostname">USER-0015-1627.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="546ccad0-eb5b-11ec-b578-7bb4b206dd31" target="HOST-12803">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1657803132</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c7ea0b00-0373-11ed-8991-41244357ae3d</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-12803" target="546ccad0-eb5b-11ec-b578-7bb4b206dd31">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1657803132</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7890625</data>
67
+ <data key="e_suspicion_score">0.7890625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">c7ea0b00-0373-11ed-8991-41244357ae3d</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/c/c7f16b60-73d5-11ee-9478-f721b34a9cef.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.168.48</data>
35
+ <data key="n_hostname">172.30.168.48</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="f39692d2-62dd-11ee-b5a9-19b7e687c7ca">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.18.187</data>
43
+ <data key="n_hostname">100.64.18.187</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2842" target="HOST-4295">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698307251</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">c7f16b60-73d5-11ee-9478-f721b34a9cef</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>