Upload per-incident GraphML sharded batch 21/27
Browse filesThis view is limited to 50 files because it contains too many changes. See raw diff
- graph/incidents_graphml/c/c69d0810-0e2a-11ef-801a-2fb46581ffa8.graphml +63 -0
- graph/incidents_graphml/c/c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1.graphml +63 -0
- graph/incidents_graphml/c/c6a8e1d0-fa48-11ee-a230-bfe539a81cf2.graphml +63 -0
- graph/incidents_graphml/c/c6acf940-26cd-11ee-863d-83828757c718.graphml +149 -0
- graph/incidents_graphml/c/c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d.graphml +63 -0
- graph/incidents_graphml/c/c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1.graphml +63 -0
- graph/incidents_graphml/c/c6bf3610-0e2a-11ef-801a-2fb46581ffa8.graphml +63 -0
- graph/incidents_graphml/c/c6dc4d70-1c97-11ee-b9c1-8f183b2e0424.graphml +77 -0
- graph/incidents_graphml/c/c6f1c230-0ad1-11ef-8694-dbcc61061be0.graphml +63 -0
- graph/incidents_graphml/c/c6f1f850-1c97-11ee-b9c1-8f183b2e0424.graphml +149 -0
- graph/incidents_graphml/c/c6f59170-1a8c-11ee-a9ef-735ae64b5bd4.graphml +77 -0
- graph/incidents_graphml/c/c6f8acf0-df14-11ee-9778-4184b1db151c.graphml +785 -0
- graph/incidents_graphml/c/c6fa8d40-ab6c-11ed-b288-05f5e2790b36.graphml +63 -0
- graph/incidents_graphml/c/c6ff4830-ab6c-11ed-b288-05f5e2790b36.graphml +63 -0
- graph/incidents_graphml/c/c7167d60-ddd0-11ee-a342-9d44f1915d3d.graphml +63 -0
- graph/incidents_graphml/c/c721b500-0cab-11ee-8985-55bb832fcc7f.graphml +63 -0
- graph/incidents_graphml/c/c72f7f50-ed53-11ec-8964-796320a841f1.graphml +77 -0
- graph/incidents_graphml/c/c7374510-3027-11ee-a433-a916fb2bb25a.graphml +169 -0
- graph/incidents_graphml/c/c73b8d40-ed53-11ec-8964-796320a841f1.graphml +77 -0
- graph/incidents_graphml/c/c74122b0-2ebf-11ee-9131-1117bdeaaaa3.graphml +113 -0
- graph/incidents_graphml/c/c7418380-1958-11ee-b3de-e709a8260af8.graphml +63 -0
- graph/incidents_graphml/c/c746f040-0cab-11ee-8985-55bb832fcc7f.graphml +63 -0
- graph/incidents_graphml/c/c74f67b0-48e3-11ee-92d0-699b2a8ba251.graphml +63 -0
- graph/incidents_graphml/c/c74f6cc0-435f-11ef-9e66-fd84d5bf3736.graphml +113 -0
- graph/incidents_graphml/c/c75a62b0-1958-11ee-b3de-e709a8260af8.graphml +63 -0
- graph/incidents_graphml/c/c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml +63 -0
- graph/incidents_graphml/c/c764f090-435f-11ef-9e66-fd84d5bf3736.graphml +77 -0
- graph/incidents_graphml/c/c767f340-95ae-11ed-94b8-8539433cb390.graphml +77 -0
- graph/incidents_graphml/c/c7778580-ab01-11ee-ace1-1bcda4a2f9d1.graphml +63 -0
- graph/incidents_graphml/c/c7781df0-13f4-11ee-9bb8-6b8312f57fd1.graphml +545 -0
- graph/incidents_graphml/c/c779f8a0-1958-11ee-b3de-e709a8260af8.graphml +63 -0
- graph/incidents_graphml/c/c788a5e0-276b-11ef-b363-fdc4064c84e0.graphml +77 -0
- graph/incidents_graphml/c/c7892d60-a113-11ed-b936-1349c6e38dc6.graphml +63 -0
- graph/incidents_graphml/c/c78c9420-ab01-11ee-ace1-1bcda4a2f9d1.graphml +63 -0
- graph/incidents_graphml/c/c78e8490-a113-11ed-b936-1349c6e38dc6.graphml +63 -0
- graph/incidents_graphml/c/c7a0fc90-8d5f-11ee-9951-411438339097.graphml +77 -0
- graph/incidents_graphml/c/c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1.graphml +63 -0
- graph/incidents_graphml/c/c7a91ef0-1958-11ee-b3de-e709a8260af8.graphml +63 -0
- graph/incidents_graphml/c/c7b0b290-2701-11ed-bc1f-0928ad8774f3.graphml +77 -0
- graph/incidents_graphml/c/c7b63020-0b80-11ef-b87c-0d8b17cd9fbf.graphml +113 -0
- graph/incidents_graphml/c/c7b6da90-33da-11ed-bcaf-e3fcd610a254.graphml +783 -0
- graph/incidents_graphml/c/c7d05e10-0725-11ee-9ff8-05edc9624e6c.graphml +77 -0
- graph/incidents_graphml/c/c7d0cb30-1958-11ee-b3de-e709a8260af8.graphml +63 -0
- graph/incidents_graphml/c/c7e05460-73d5-11ee-9478-f721b34a9cef.graphml +63 -0
- graph/incidents_graphml/c/c7e0f950-ddd0-11ee-a342-9d44f1915d3d.graphml +63 -0
- graph/incidents_graphml/c/c7e17d30-3d6c-11ee-b209-c721199fad49.graphml +63 -0
- graph/incidents_graphml/c/c7e4c860-1958-11ee-b3de-e709a8260af8.graphml +63 -0
- graph/incidents_graphml/c/c7e82540-5789-11ee-b4dd-e56c30c12cd4.graphml +63 -0
- graph/incidents_graphml/c/c7ea0b00-0373-11ed-8991-41244357ae3d.graphml +77 -0
- graph/incidents_graphml/c/c7f16b60-73d5-11ee-9478-f721b34a9cef.graphml +63 -0
graph/incidents_graphml/c/c69d0810-0e2a-11ef-801a-2fb46581ffa8.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="172a2fc0-08a9-11ee-81da-e940bdca9f29">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.41.232</data>
|
| 35 |
+
<data key="n_hostname">100.64.41.232</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="260096f3-062a-11ee-94f6-0d301f382bbb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.174.172</data>
|
| 43 |
+
<data key="n_hostname">172.30.174.172</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="172a2fc0-08a9-11ee-81da-e940bdca9f29" target="HOST-2946">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1715276235</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c69d0810-0e2a-11ef-801a-2fb46581ffa8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="0afa78d0-3e10-11ee-b7fc-254e746cee15">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.46.206</data>
|
| 35 |
+
<data key="n_hostname">100.64.46.206</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9ff29330-0627-11ee-ad14-25a724519715">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.113.78.104</data>
|
| 43 |
+
<data key="n_hostname">10.113.78.104</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="0afa78d0-3e10-11ee-b7fc-254e746cee15" target="HOST-16999">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1704373461</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c6a73d30-ab01-11ee-ace1-1bcda4a2f9d1</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c6a8e1d0-fa48-11ee-a230-bfe539a81cf2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="e8c39ed8-ed8d-11ee-be57-e7ce5e3153e8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.27.41</data>
|
| 35 |
+
<data key="n_hostname">100.64.27.41</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.31.101.1</data>
|
| 43 |
+
<data key="n_hostname">172.31.101.1</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-5468" target="HOST-2821">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1713090097</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c6a8e1d0-fa48-11ee-a230-bfe539a81cf2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c6acf940-26cd-11ee-863d-83828757c718.graphml
ADDED
|
@@ -0,0 +1,149 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="bb4365d4-062f-11ee-99d3-4bf3ed477666">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.10.203</data>
|
| 35 |
+
<data key="n_hostname">100.64.10.203</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.16.233.43</data>
|
| 43 |
+
<data key="n_hostname">172.16.233.43</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="2f581655-0626-11ee-9882-3f47c834d49b">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.13.223</data>
|
| 51 |
+
<data key="n_hostname">100.64.13.223</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="6885b0e3-0626-11ee-87d2-5909d78e9e20">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.7.39</data>
|
| 59 |
+
<data key="n_hostname">100.64.7.39</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<edge id="e1" source="HOST-3215" target="HOST-2758">
|
| 65 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 66 |
+
<data key="e_timestamp">1689837573</data>
|
| 67 |
+
<data key="e_label_binary">malicious</data>
|
| 68 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 69 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 70 |
+
<data key="e_mo_name">Data Theft</data>
|
| 71 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 72 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 73 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 74 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 75 |
+
<data key="e_disposition">Disrupted</data>
|
| 76 |
+
<data key="e_incident_id">c6acf940-26cd-11ee-863d-83828757c718</data>
|
| 77 |
+
</edge>
|
| 78 |
+
<edge id="e2" source="HOST-2758" target="HOST-3215">
|
| 79 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 80 |
+
<data key="e_timestamp">1689837573</data>
|
| 81 |
+
<data key="e_label_binary">malicious</data>
|
| 82 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 83 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 84 |
+
<data key="e_mo_name">Data Theft</data>
|
| 85 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 86 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 87 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 88 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 89 |
+
<data key="e_disposition">Disrupted</data>
|
| 90 |
+
<data key="e_incident_id">c6acf940-26cd-11ee-863d-83828757c718</data>
|
| 91 |
+
</edge>
|
| 92 |
+
<edge id="e3" source="HOST-3622" target="HOST-2758">
|
| 93 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 94 |
+
<data key="e_timestamp">1689837573</data>
|
| 95 |
+
<data key="e_label_binary">malicious</data>
|
| 96 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 97 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 98 |
+
<data key="e_mo_name">Data Theft</data>
|
| 99 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 100 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 101 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 102 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 103 |
+
<data key="e_disposition">Disrupted</data>
|
| 104 |
+
<data key="e_incident_id">c6acf940-26cd-11ee-863d-83828757c718</data>
|
| 105 |
+
</edge>
|
| 106 |
+
<edge id="e4" source="HOST-2758" target="HOST-3622">
|
| 107 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 108 |
+
<data key="e_timestamp">1689837573</data>
|
| 109 |
+
<data key="e_label_binary">malicious</data>
|
| 110 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 111 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 112 |
+
<data key="e_mo_name">Data Theft</data>
|
| 113 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 114 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 115 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 116 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 117 |
+
<data key="e_disposition">Disrupted</data>
|
| 118 |
+
<data key="e_incident_id">c6acf940-26cd-11ee-863d-83828757c718</data>
|
| 119 |
+
</edge>
|
| 120 |
+
<edge id="e5" source="6885b0e3-0626-11ee-87d2-5909d78e9e20" target="HOST-2758">
|
| 121 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 122 |
+
<data key="e_timestamp">1689837573</data>
|
| 123 |
+
<data key="e_label_binary">malicious</data>
|
| 124 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 125 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 126 |
+
<data key="e_mo_name">Data Theft</data>
|
| 127 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 128 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 129 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 130 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 131 |
+
<data key="e_disposition">Disrupted</data>
|
| 132 |
+
<data key="e_incident_id">c6acf940-26cd-11ee-863d-83828757c718</data>
|
| 133 |
+
</edge>
|
| 134 |
+
<edge id="e6" source="HOST-2758" target="6885b0e3-0626-11ee-87d2-5909d78e9e20">
|
| 135 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 136 |
+
<data key="e_timestamp">1689837573</data>
|
| 137 |
+
<data key="e_label_binary">malicious</data>
|
| 138 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 139 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 140 |
+
<data key="e_mo_name">Data Theft</data>
|
| 141 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 142 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 143 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 144 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 145 |
+
<data key="e_disposition">Disrupted</data>
|
| 146 |
+
<data key="e_incident_id">c6acf940-26cd-11ee-863d-83828757c718</data>
|
| 147 |
+
</edge>
|
| 148 |
+
</graph>
|
| 149 |
+
</graphml>
|
graph/incidents_graphml/c/c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="74b5f325-34cf-11ee-befa-2f9557df71fb">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.23.161</data>
|
| 35 |
+
<data key="n_hostname">100.64.23.161</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.214.148</data>
|
| 43 |
+
<data key="n_hostname">172.30.214.148</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-4956" target="HOST-2720">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1709959925</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c6b5e6d0-ddd0-11ee-a342-9d44f1915d3d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="9ff29330-0627-11ee-ad14-25a724519715">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.113.78.104</data>
|
| 35 |
+
<data key="n_hostname">10.113.78.104</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="0afa78d0-3e10-11ee-b7fc-254e746cee15">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.46.206</data>
|
| 43 |
+
<data key="n_hostname">100.64.46.206</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-16999" target="HOST-18910">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1704373461</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c6b7df00-ab01-11ee-ace1-1bcda4a2f9d1</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c6bf3610-0e2a-11ef-801a-2fb46581ffa8.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="7319d380-0665-11ee-a8ac-bb5c5fd6d88d">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.41.234</data>
|
| 35 |
+
<data key="n_hostname">100.64.41.234</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.31.6.172</data>
|
| 43 |
+
<data key="n_hostname">172.31.6.172</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="7319d380-0665-11ee-a8ac-bb5c5fd6d88d" target="HOST-2757">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1715276235</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c6bf3610-0e2a-11ef-801a-2fb46581ffa8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c6dc4d70-1c97-11ee-b9c1-8f183b2e0424.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="19ae2cf0-0774-11ee-892d-7fcfd5c0e2cb">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.76.233</data>
|
| 35 |
+
<data key="n_hostname">100.64.76.233</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="528721e0-0642-11ee-b879-8fa356303378">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.72.51</data>
|
| 43 |
+
<data key="n_hostname">100.64.72.51</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="19ae2cf0-0774-11ee-892d-7fcfd5c0e2cb" target="528721e0-0642-11ee-b879-8fa356303378">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688714869</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c6dc4d70-1c97-11ee-b9c1-8f183b2e0424</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="528721e0-0642-11ee-b879-8fa356303378" target="19ae2cf0-0774-11ee-892d-7fcfd5c0e2cb">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1688714869</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">c6dc4d70-1c97-11ee-b9c1-8f183b2e0424</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/c/c6f1c230-0ad1-11ef-8694-dbcc61061be0.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="85418bc0-e968-11ee-a876-0b133aae710a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.15.142</data>
|
| 35 |
+
<data key="n_hostname">100.64.15.142</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.54.66</data>
|
| 43 |
+
<data key="n_hostname">172.24.54.66</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="85418bc0-e968-11ee-a876-0b133aae710a" target="HOST-2745">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1714908157</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c6f1c230-0ad1-11ef-8694-dbcc61061be0</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c6f1f850-1c97-11ee-b9c1-8f183b2e0424.graphml
ADDED
|
@@ -0,0 +1,149 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="71653f21-0638-11ee-9d16-b90ac473a2f2">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.40.45</data>
|
| 35 |
+
<data key="n_hostname">100.64.40.45</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="3b0e86c0-0642-11ee-93f4-159fa6734fa9">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.73.195</data>
|
| 43 |
+
<data key="n_hostname">100.64.73.195</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="d8aa1bf0-063e-11ee-8fd2-af3b08029a6c">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.48.254</data>
|
| 51 |
+
<data key="n_hostname">100.64.48.254</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="49e15462-0648-11ee-b71d-ad0da3528947">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.64.154</data>
|
| 59 |
+
<data key="n_hostname">100.64.64.154</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 62 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<edge id="e1" source="71653f21-0638-11ee-9d16-b90ac473a2f2" target="HOST-13332">
|
| 65 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 66 |
+
<data key="e_timestamp">1688714869</data>
|
| 67 |
+
<data key="e_label_binary">malicious</data>
|
| 68 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 69 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 70 |
+
<data key="e_mo_name">Data Theft</data>
|
| 71 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 72 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 73 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 74 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 75 |
+
<data key="e_disposition">Disrupted</data>
|
| 76 |
+
<data key="e_incident_id">c6f1f850-1c97-11ee-b9c1-8f183b2e0424</data>
|
| 77 |
+
</edge>
|
| 78 |
+
<edge id="e2" source="HOST-13332" target="71653f21-0638-11ee-9d16-b90ac473a2f2">
|
| 79 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 80 |
+
<data key="e_timestamp">1688714869</data>
|
| 81 |
+
<data key="e_label_binary">malicious</data>
|
| 82 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 83 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 84 |
+
<data key="e_mo_name">Data Theft</data>
|
| 85 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 86 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 87 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 88 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 89 |
+
<data key="e_disposition">Disrupted</data>
|
| 90 |
+
<data key="e_incident_id">c6f1f850-1c97-11ee-b9c1-8f183b2e0424</data>
|
| 91 |
+
</edge>
|
| 92 |
+
<edge id="e3" source="d8aa1bf0-063e-11ee-8fd2-af3b08029a6c" target="HOST-13332">
|
| 93 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 94 |
+
<data key="e_timestamp">1688714869</data>
|
| 95 |
+
<data key="e_label_binary">malicious</data>
|
| 96 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 97 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 98 |
+
<data key="e_mo_name">Data Theft</data>
|
| 99 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 100 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 101 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 102 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 103 |
+
<data key="e_disposition">Disrupted</data>
|
| 104 |
+
<data key="e_incident_id">c6f1f850-1c97-11ee-b9c1-8f183b2e0424</data>
|
| 105 |
+
</edge>
|
| 106 |
+
<edge id="e4" source="HOST-13332" target="d8aa1bf0-063e-11ee-8fd2-af3b08029a6c">
|
| 107 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 108 |
+
<data key="e_timestamp">1688714869</data>
|
| 109 |
+
<data key="e_label_binary">malicious</data>
|
| 110 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 111 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 112 |
+
<data key="e_mo_name">Data Theft</data>
|
| 113 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 114 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 115 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 116 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 117 |
+
<data key="e_disposition">Disrupted</data>
|
| 118 |
+
<data key="e_incident_id">c6f1f850-1c97-11ee-b9c1-8f183b2e0424</data>
|
| 119 |
+
</edge>
|
| 120 |
+
<edge id="e5" source="49e15462-0648-11ee-b71d-ad0da3528947" target="HOST-13332">
|
| 121 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 122 |
+
<data key="e_timestamp">1688714869</data>
|
| 123 |
+
<data key="e_label_binary">malicious</data>
|
| 124 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 125 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 126 |
+
<data key="e_mo_name">Data Theft</data>
|
| 127 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 128 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 129 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 130 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 131 |
+
<data key="e_disposition">Disrupted</data>
|
| 132 |
+
<data key="e_incident_id">c6f1f850-1c97-11ee-b9c1-8f183b2e0424</data>
|
| 133 |
+
</edge>
|
| 134 |
+
<edge id="e6" source="HOST-13332" target="49e15462-0648-11ee-b71d-ad0da3528947">
|
| 135 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 136 |
+
<data key="e_timestamp">1688714869</data>
|
| 137 |
+
<data key="e_label_binary">malicious</data>
|
| 138 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 139 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 140 |
+
<data key="e_mo_name">Data Theft</data>
|
| 141 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 142 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 143 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 144 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 145 |
+
<data key="e_disposition">Disrupted</data>
|
| 146 |
+
<data key="e_incident_id">c6f1f850-1c97-11ee-b9c1-8f183b2e0424</data>
|
| 147 |
+
</edge>
|
| 148 |
+
</graph>
|
| 149 |
+
</graphml>
|
graph/incidents_graphml/c/c6f59170-1a8c-11ee-a9ef-735ae64b5bd4.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="81c7fe75-18bc-11ee-98fb-cd756c0af55d">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.80.169</data>
|
| 35 |
+
<data key="n_hostname">100.64.80.169</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e06a0500-0632-11ee-a699-19fd706a4513">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.72.137</data>
|
| 43 |
+
<data key="n_hostname">100.64.72.137</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="81c7fe75-18bc-11ee-98fb-cd756c0af55d" target="HOST-13875">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688490243</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c6f59170-1a8c-11ee-a9ef-735ae64b5bd4</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-13875" target="81c7fe75-18bc-11ee-98fb-cd756c0af55d">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1688490243</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">c6f59170-1a8c-11ee-a9ef-735ae64b5bd4</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/c/c6f8acf0-df14-11ee-9778-4184b1db151c.graphml
ADDED
|
@@ -0,0 +1,785 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="d1cec350-7de7-11ee-bcf9-e5147e3f0332">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.10.33</data>
|
| 35 |
+
<data key="n_hostname">100.64.10.33</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.117.12.163</data>
|
| 43 |
+
<data key="n_hostname">10.117.12.163</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="10300690-ab6a-11ee-9ad3-1bd666531b69">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.10.34</data>
|
| 51 |
+
<data key="n_hostname">100.64.10.34</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="2d2acb82-0625-11ee-b173-c9921719c2f8">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">172.31.78.41</data>
|
| 59 |
+
<data key="n_hostname">172.31.78.41</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="9d0b2b70-a08a-11ee-b4df-013352fa07f3">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.10.35</data>
|
| 67 |
+
<data key="n_hostname">100.64.10.35</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="2b5251c2-bc1e-11ee-b8c6-a9908c5c42d2">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.10.36</data>
|
| 75 |
+
<data key="n_hostname">100.64.10.36</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="0458ba10-062e-11ee-b010-f122865b5659">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">172.26.23.117</data>
|
| 83 |
+
<data key="n_hostname">172.26.23.117</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.25</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="cde11bf0-0626-11ee-8860-f951c26910c1">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.10.30</data>
|
| 91 |
+
<data key="n_hostname">100.64.10.30</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.25</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="836c1470-84cb-11ee-a675-1f48ca96321b">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.10.37</data>
|
| 99 |
+
<data key="n_hostname">100.64.10.37</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.25</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">172.31.6.172</data>
|
| 107 |
+
<data key="n_hostname">172.31.6.172</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.25</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="a2ab6a40-062a-11ee-9792-13ac4ddb104c">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.10.38</data>
|
| 115 |
+
<data key="n_hostname">100.64.10.38</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.25</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="7a5f1280-8064-11ee-9547-8b62fe6bab6f">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">100.64.10.39</data>
|
| 123 |
+
<data key="n_hostname">100.64.10.39</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.25</data>
|
| 126 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="07404761-db4a-11ee-a158-2fcf8a2054e5">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">100.64.10.40</data>
|
| 131 |
+
<data key="n_hostname">100.64.10.40</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.25</data>
|
| 134 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="9341b8a2-df11-11ee-9f99-ad8aa4a3698e">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">100.64.10.41</data>
|
| 139 |
+
<data key="n_hostname">100.64.10.41</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.25</data>
|
| 142 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<node id="8aadef10-0627-11ee-bb6d-91e4d286acbc">
|
| 145 |
+
<data key="n_type">HOST</data>
|
| 146 |
+
<data key="n_ip">100.64.10.42</data>
|
| 147 |
+
<data key="n_hostname">100.64.10.42</data>
|
| 148 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 149 |
+
<data key="n_suspicion_score">0.25</data>
|
| 150 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 151 |
+
</node>
|
| 152 |
+
<node id="679c7530-3a22-11ee-b455-439f5edf4254">
|
| 153 |
+
<data key="n_type">HOST</data>
|
| 154 |
+
<data key="n_ip">100.64.10.43</data>
|
| 155 |
+
<data key="n_hostname">100.64.10.43</data>
|
| 156 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 157 |
+
<data key="n_suspicion_score">0.25</data>
|
| 158 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 159 |
+
</node>
|
| 160 |
+
<node id="bab5f234-83cb-11ee-8fa6-77181c369f68">
|
| 161 |
+
<data key="n_type">HOST</data>
|
| 162 |
+
<data key="n_ip">100.64.10.44</data>
|
| 163 |
+
<data key="n_hostname">100.64.10.44</data>
|
| 164 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 165 |
+
<data key="n_suspicion_score">0.25</data>
|
| 166 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 167 |
+
</node>
|
| 168 |
+
<node id="9fdd3922-09da-11ee-ba30-238fae1b5b6e">
|
| 169 |
+
<data key="n_type">HOST</data>
|
| 170 |
+
<data key="n_ip">100.64.10.45</data>
|
| 171 |
+
<data key="n_hostname">100.64.10.45</data>
|
| 172 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 173 |
+
<data key="n_suspicion_score">0.25</data>
|
| 174 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 175 |
+
</node>
|
| 176 |
+
<node id="457bcfd0-0626-11ee-8794-6bae0a4a6dd8">
|
| 177 |
+
<data key="n_type">HOST</data>
|
| 178 |
+
<data key="n_ip">100.64.10.46</data>
|
| 179 |
+
<data key="n_hostname">100.64.10.46</data>
|
| 180 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 181 |
+
<data key="n_suspicion_score">0.25</data>
|
| 182 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 183 |
+
</node>
|
| 184 |
+
<node id="61d05073-0626-11ee-87d2-5909d78e9e20">
|
| 185 |
+
<data key="n_type">HOST</data>
|
| 186 |
+
<data key="n_ip">100.64.10.47</data>
|
| 187 |
+
<data key="n_hostname">100.64.10.47</data>
|
| 188 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 189 |
+
<data key="n_suspicion_score">0.25</data>
|
| 190 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 191 |
+
</node>
|
| 192 |
+
<node id="5c928290-062b-11ee-b9d7-dfbc3b8151fb">
|
| 193 |
+
<data key="n_type">HOST</data>
|
| 194 |
+
<data key="n_ip">100.64.10.48</data>
|
| 195 |
+
<data key="n_hostname">100.64.10.48</data>
|
| 196 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 197 |
+
<data key="n_suspicion_score">0.25</data>
|
| 198 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 199 |
+
</node>
|
| 200 |
+
<node id="627fe5d2-0630-11ee-b4a5-7b67dc16a2f1">
|
| 201 |
+
<data key="n_type">HOST</data>
|
| 202 |
+
<data key="n_ip">100.64.10.49</data>
|
| 203 |
+
<data key="n_hostname">100.64.10.49</data>
|
| 204 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 205 |
+
<data key="n_suspicion_score">0.25</data>
|
| 206 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 207 |
+
</node>
|
| 208 |
+
<node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
|
| 209 |
+
<data key="n_type">HOST</data>
|
| 210 |
+
<data key="n_ip">172.30.208.219</data>
|
| 211 |
+
<data key="n_hostname">172.30.208.219</data>
|
| 212 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 213 |
+
<data key="n_suspicion_score">0.25</data>
|
| 214 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 215 |
+
</node>
|
| 216 |
+
<node id="5ff31ea2-34ce-11ee-b4b4-b5cb39981fef">
|
| 217 |
+
<data key="n_type">HOST</data>
|
| 218 |
+
<data key="n_ip">100.64.10.50</data>
|
| 219 |
+
<data key="n_hostname">100.64.10.50</data>
|
| 220 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 221 |
+
<data key="n_suspicion_score">0.25</data>
|
| 222 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 223 |
+
</node>
|
| 224 |
+
<edge id="e1" source="d1cec350-7de7-11ee-bcf9-e5147e3f0332" target="HOST-2773">
|
| 225 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 226 |
+
<data key="e_timestamp">1710099082</data>
|
| 227 |
+
<data key="e_label_binary">malicious</data>
|
| 228 |
+
<data key="e_label_confidence">0.7</data>
|
| 229 |
+
<data key="e_suspicion_score">0.25</data>
|
| 230 |
+
<data key="e_mo_name">Data Theft</data>
|
| 231 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 232 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 233 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 234 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 235 |
+
<data key="e_disposition">Unprocessed</data>
|
| 236 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 237 |
+
</edge>
|
| 238 |
+
<edge id="e2" source="HOST-2773" target="d1cec350-7de7-11ee-bcf9-e5147e3f0332">
|
| 239 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 240 |
+
<data key="e_timestamp">1710099082</data>
|
| 241 |
+
<data key="e_label_binary">malicious</data>
|
| 242 |
+
<data key="e_label_confidence">0.7</data>
|
| 243 |
+
<data key="e_suspicion_score">0.25</data>
|
| 244 |
+
<data key="e_mo_name">Data Theft</data>
|
| 245 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 246 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 247 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 248 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 249 |
+
<data key="e_disposition">Unprocessed</data>
|
| 250 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 251 |
+
</edge>
|
| 252 |
+
<edge id="e3" source="10300690-ab6a-11ee-9ad3-1bd666531b69" target="HOST-2807">
|
| 253 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 254 |
+
<data key="e_timestamp">1710099082</data>
|
| 255 |
+
<data key="e_label_binary">malicious</data>
|
| 256 |
+
<data key="e_label_confidence">0.7</data>
|
| 257 |
+
<data key="e_suspicion_score">0.25</data>
|
| 258 |
+
<data key="e_mo_name">Data Theft</data>
|
| 259 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 260 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 261 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 262 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 263 |
+
<data key="e_disposition">Unprocessed</data>
|
| 264 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 265 |
+
</edge>
|
| 266 |
+
<edge id="e4" source="HOST-2807" target="10300690-ab6a-11ee-9ad3-1bd666531b69">
|
| 267 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 268 |
+
<data key="e_timestamp">1710099082</data>
|
| 269 |
+
<data key="e_label_binary">malicious</data>
|
| 270 |
+
<data key="e_label_confidence">0.7</data>
|
| 271 |
+
<data key="e_suspicion_score">0.25</data>
|
| 272 |
+
<data key="e_mo_name">Data Theft</data>
|
| 273 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 274 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 275 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 276 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 277 |
+
<data key="e_disposition">Unprocessed</data>
|
| 278 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 279 |
+
</edge>
|
| 280 |
+
<edge id="e5" source="9d0b2b70-a08a-11ee-b4df-013352fa07f3" target="HOST-2807">
|
| 281 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 282 |
+
<data key="e_timestamp">1710099082</data>
|
| 283 |
+
<data key="e_label_binary">malicious</data>
|
| 284 |
+
<data key="e_label_confidence">0.7</data>
|
| 285 |
+
<data key="e_suspicion_score">0.25</data>
|
| 286 |
+
<data key="e_mo_name">Data Theft</data>
|
| 287 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 288 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 289 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 290 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 291 |
+
<data key="e_disposition">Unprocessed</data>
|
| 292 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 293 |
+
</edge>
|
| 294 |
+
<edge id="e6" source="HOST-2807" target="9d0b2b70-a08a-11ee-b4df-013352fa07f3">
|
| 295 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 296 |
+
<data key="e_timestamp">1710099082</data>
|
| 297 |
+
<data key="e_label_binary">malicious</data>
|
| 298 |
+
<data key="e_label_confidence">0.7</data>
|
| 299 |
+
<data key="e_suspicion_score">0.25</data>
|
| 300 |
+
<data key="e_mo_name">Data Theft</data>
|
| 301 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 302 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 303 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 304 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 305 |
+
<data key="e_disposition">Unprocessed</data>
|
| 306 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 307 |
+
</edge>
|
| 308 |
+
<edge id="e7" source="d1cec350-7de7-11ee-bcf9-e5147e3f0332" target="HOST-2807">
|
| 309 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 310 |
+
<data key="e_timestamp">1710099082</data>
|
| 311 |
+
<data key="e_label_binary">malicious</data>
|
| 312 |
+
<data key="e_label_confidence">0.7</data>
|
| 313 |
+
<data key="e_suspicion_score">0.25</data>
|
| 314 |
+
<data key="e_mo_name">Data Theft</data>
|
| 315 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 316 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 317 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 318 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 319 |
+
<data key="e_disposition">Unprocessed</data>
|
| 320 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 321 |
+
</edge>
|
| 322 |
+
<edge id="e8" source="HOST-2807" target="d1cec350-7de7-11ee-bcf9-e5147e3f0332">
|
| 323 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 324 |
+
<data key="e_timestamp">1710099082</data>
|
| 325 |
+
<data key="e_label_binary">malicious</data>
|
| 326 |
+
<data key="e_label_confidence">0.7</data>
|
| 327 |
+
<data key="e_suspicion_score">0.25</data>
|
| 328 |
+
<data key="e_mo_name">Data Theft</data>
|
| 329 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 330 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 331 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 332 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 333 |
+
<data key="e_disposition">Unprocessed</data>
|
| 334 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 335 |
+
</edge>
|
| 336 |
+
<edge id="e9" source="2b5251c2-bc1e-11ee-b8c6-a9908c5c42d2" target="HOST-2824">
|
| 337 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 338 |
+
<data key="e_timestamp">1710099082</data>
|
| 339 |
+
<data key="e_label_binary">malicious</data>
|
| 340 |
+
<data key="e_label_confidence">0.7</data>
|
| 341 |
+
<data key="e_suspicion_score">0.25</data>
|
| 342 |
+
<data key="e_mo_name">Data Theft</data>
|
| 343 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 344 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 345 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 346 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 347 |
+
<data key="e_disposition">Unprocessed</data>
|
| 348 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 349 |
+
</edge>
|
| 350 |
+
<edge id="e10" source="HOST-2824" target="2b5251c2-bc1e-11ee-b8c6-a9908c5c42d2">
|
| 351 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 352 |
+
<data key="e_timestamp">1710099082</data>
|
| 353 |
+
<data key="e_label_binary">malicious</data>
|
| 354 |
+
<data key="e_label_confidence">0.7</data>
|
| 355 |
+
<data key="e_suspicion_score">0.25</data>
|
| 356 |
+
<data key="e_mo_name">Data Theft</data>
|
| 357 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 358 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 359 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 360 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 361 |
+
<data key="e_disposition">Unprocessed</data>
|
| 362 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 363 |
+
</edge>
|
| 364 |
+
<edge id="e11" source="HOST-3120" target="HOST-2824">
|
| 365 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 366 |
+
<data key="e_timestamp">1710099082</data>
|
| 367 |
+
<data key="e_label_binary">malicious</data>
|
| 368 |
+
<data key="e_label_confidence">0.7</data>
|
| 369 |
+
<data key="e_suspicion_score">0.25</data>
|
| 370 |
+
<data key="e_mo_name">Data Theft</data>
|
| 371 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 372 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 373 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 374 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 375 |
+
<data key="e_disposition">Unprocessed</data>
|
| 376 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 377 |
+
</edge>
|
| 378 |
+
<edge id="e12" source="HOST-2824" target="HOST-3120">
|
| 379 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 380 |
+
<data key="e_timestamp">1710099082</data>
|
| 381 |
+
<data key="e_label_binary">malicious</data>
|
| 382 |
+
<data key="e_label_confidence">0.7</data>
|
| 383 |
+
<data key="e_suspicion_score">0.25</data>
|
| 384 |
+
<data key="e_mo_name">Data Theft</data>
|
| 385 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 386 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 387 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 388 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 389 |
+
<data key="e_disposition">Unprocessed</data>
|
| 390 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 391 |
+
</edge>
|
| 392 |
+
<edge id="e13" source="836c1470-84cb-11ee-a675-1f48ca96321b" target="HOST-2824">
|
| 393 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 394 |
+
<data key="e_timestamp">1710099082</data>
|
| 395 |
+
<data key="e_label_binary">malicious</data>
|
| 396 |
+
<data key="e_label_confidence">0.7</data>
|
| 397 |
+
<data key="e_suspicion_score">0.25</data>
|
| 398 |
+
<data key="e_mo_name">Data Theft</data>
|
| 399 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 400 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 401 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 402 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 403 |
+
<data key="e_disposition">Unprocessed</data>
|
| 404 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 405 |
+
</edge>
|
| 406 |
+
<edge id="e14" source="HOST-2824" target="836c1470-84cb-11ee-a675-1f48ca96321b">
|
| 407 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 408 |
+
<data key="e_timestamp">1710099082</data>
|
| 409 |
+
<data key="e_label_binary">malicious</data>
|
| 410 |
+
<data key="e_label_confidence">0.7</data>
|
| 411 |
+
<data key="e_suspicion_score">0.25</data>
|
| 412 |
+
<data key="e_mo_name">Data Theft</data>
|
| 413 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 414 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 415 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 416 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 417 |
+
<data key="e_disposition">Unprocessed</data>
|
| 418 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 419 |
+
</edge>
|
| 420 |
+
<edge id="e15" source="d1cec350-7de7-11ee-bcf9-e5147e3f0332" target="HOST-2824">
|
| 421 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 422 |
+
<data key="e_timestamp">1710099082</data>
|
| 423 |
+
<data key="e_label_binary">malicious</data>
|
| 424 |
+
<data key="e_label_confidence">0.7</data>
|
| 425 |
+
<data key="e_suspicion_score">0.25</data>
|
| 426 |
+
<data key="e_mo_name">Data Theft</data>
|
| 427 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 428 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 429 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 430 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 431 |
+
<data key="e_disposition">Unprocessed</data>
|
| 432 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 433 |
+
</edge>
|
| 434 |
+
<edge id="e16" source="HOST-2824" target="d1cec350-7de7-11ee-bcf9-e5147e3f0332">
|
| 435 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 436 |
+
<data key="e_timestamp">1710099082</data>
|
| 437 |
+
<data key="e_label_binary">malicious</data>
|
| 438 |
+
<data key="e_label_confidence">0.7</data>
|
| 439 |
+
<data key="e_suspicion_score">0.25</data>
|
| 440 |
+
<data key="e_mo_name">Data Theft</data>
|
| 441 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 442 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 443 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 444 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 445 |
+
<data key="e_disposition">Unprocessed</data>
|
| 446 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 447 |
+
</edge>
|
| 448 |
+
<edge id="e17" source="d1cec350-7de7-11ee-bcf9-e5147e3f0332" target="HOST-2757">
|
| 449 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 450 |
+
<data key="e_timestamp">1710099082</data>
|
| 451 |
+
<data key="e_label_binary">malicious</data>
|
| 452 |
+
<data key="e_label_confidence">0.7</data>
|
| 453 |
+
<data key="e_suspicion_score">0.25</data>
|
| 454 |
+
<data key="e_mo_name">Data Theft</data>
|
| 455 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 456 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 457 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 458 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 459 |
+
<data key="e_disposition">Unprocessed</data>
|
| 460 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 461 |
+
</edge>
|
| 462 |
+
<edge id="e18" source="HOST-2757" target="d1cec350-7de7-11ee-bcf9-e5147e3f0332">
|
| 463 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 464 |
+
<data key="e_timestamp">1710099082</data>
|
| 465 |
+
<data key="e_label_binary">malicious</data>
|
| 466 |
+
<data key="e_label_confidence">0.7</data>
|
| 467 |
+
<data key="e_suspicion_score">0.25</data>
|
| 468 |
+
<data key="e_mo_name">Data Theft</data>
|
| 469 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 470 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 471 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 472 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 473 |
+
<data key="e_disposition">Unprocessed</data>
|
| 474 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 475 |
+
</edge>
|
| 476 |
+
<edge id="e19" source="HOST-2807" target="a2ab6a40-062a-11ee-9792-13ac4ddb104c">
|
| 477 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 478 |
+
<data key="e_timestamp">1710099082</data>
|
| 479 |
+
<data key="e_label_binary">malicious</data>
|
| 480 |
+
<data key="e_label_confidence">0.7</data>
|
| 481 |
+
<data key="e_suspicion_score">0.25</data>
|
| 482 |
+
<data key="e_mo_name">Data Theft</data>
|
| 483 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 484 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 485 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 486 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 487 |
+
<data key="e_disposition">Unprocessed</data>
|
| 488 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 489 |
+
</edge>
|
| 490 |
+
<edge id="e20" source="a2ab6a40-062a-11ee-9792-13ac4ddb104c" target="HOST-2807">
|
| 491 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 492 |
+
<data key="e_timestamp">1710099082</data>
|
| 493 |
+
<data key="e_label_binary">malicious</data>
|
| 494 |
+
<data key="e_label_confidence">0.7</data>
|
| 495 |
+
<data key="e_suspicion_score">0.25</data>
|
| 496 |
+
<data key="e_mo_name">Data Theft</data>
|
| 497 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 498 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 499 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 500 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 501 |
+
<data key="e_disposition">Unprocessed</data>
|
| 502 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 503 |
+
</edge>
|
| 504 |
+
<edge id="e21" source="7a5f1280-8064-11ee-9547-8b62fe6bab6f" target="HOST-2773">
|
| 505 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 506 |
+
<data key="e_timestamp">1710099082</data>
|
| 507 |
+
<data key="e_label_binary">malicious</data>
|
| 508 |
+
<data key="e_label_confidence">0.7</data>
|
| 509 |
+
<data key="e_suspicion_score">0.25</data>
|
| 510 |
+
<data key="e_mo_name">Data Theft</data>
|
| 511 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 512 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 513 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 514 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 515 |
+
<data key="e_disposition">Unprocessed</data>
|
| 516 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 517 |
+
</edge>
|
| 518 |
+
<edge id="e22" source="HOST-2773" target="7a5f1280-8064-11ee-9547-8b62fe6bab6f">
|
| 519 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 520 |
+
<data key="e_timestamp">1710099082</data>
|
| 521 |
+
<data key="e_label_binary">malicious</data>
|
| 522 |
+
<data key="e_label_confidence">0.7</data>
|
| 523 |
+
<data key="e_suspicion_score">0.25</data>
|
| 524 |
+
<data key="e_mo_name">Data Theft</data>
|
| 525 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 526 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 527 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 528 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 529 |
+
<data key="e_disposition">Unprocessed</data>
|
| 530 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 531 |
+
</edge>
|
| 532 |
+
<edge id="e23" source="HOST-2773" target="07404761-db4a-11ee-a158-2fcf8a2054e5">
|
| 533 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 534 |
+
<data key="e_timestamp">1710099082</data>
|
| 535 |
+
<data key="e_label_binary">malicious</data>
|
| 536 |
+
<data key="e_label_confidence">0.7</data>
|
| 537 |
+
<data key="e_suspicion_score">0.25</data>
|
| 538 |
+
<data key="e_mo_name">Data Theft</data>
|
| 539 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 540 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 541 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 542 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 543 |
+
<data key="e_disposition">Unprocessed</data>
|
| 544 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 545 |
+
</edge>
|
| 546 |
+
<edge id="e24" source="9341b8a2-df11-11ee-9f99-ad8aa4a3698e" target="HOST-2807">
|
| 547 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 548 |
+
<data key="e_timestamp">1710099082</data>
|
| 549 |
+
<data key="e_label_binary">malicious</data>
|
| 550 |
+
<data key="e_label_confidence">0.7</data>
|
| 551 |
+
<data key="e_suspicion_score">0.25</data>
|
| 552 |
+
<data key="e_mo_name">Data Theft</data>
|
| 553 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 554 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 555 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 556 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 557 |
+
<data key="e_disposition">Unprocessed</data>
|
| 558 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 559 |
+
</edge>
|
| 560 |
+
<edge id="e25" source="HOST-2807" target="9341b8a2-df11-11ee-9f99-ad8aa4a3698e">
|
| 561 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 562 |
+
<data key="e_timestamp">1710099082</data>
|
| 563 |
+
<data key="e_label_binary">malicious</data>
|
| 564 |
+
<data key="e_label_confidence">0.7</data>
|
| 565 |
+
<data key="e_suspicion_score">0.25</data>
|
| 566 |
+
<data key="e_mo_name">Data Theft</data>
|
| 567 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 568 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 569 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 570 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 571 |
+
<data key="e_disposition">Unprocessed</data>
|
| 572 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 573 |
+
</edge>
|
| 574 |
+
<edge id="e26" source="8aadef10-0627-11ee-bb6d-91e4d286acbc" target="HOST-2824">
|
| 575 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 576 |
+
<data key="e_timestamp">1710099082</data>
|
| 577 |
+
<data key="e_label_binary">malicious</data>
|
| 578 |
+
<data key="e_label_confidence">0.7</data>
|
| 579 |
+
<data key="e_suspicion_score">0.25</data>
|
| 580 |
+
<data key="e_mo_name">Data Theft</data>
|
| 581 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 582 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 583 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 584 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 585 |
+
<data key="e_disposition">Unprocessed</data>
|
| 586 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 587 |
+
</edge>
|
| 588 |
+
<edge id="e27" source="HOST-2824" target="8aadef10-0627-11ee-bb6d-91e4d286acbc">
|
| 589 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 590 |
+
<data key="e_timestamp">1710099082</data>
|
| 591 |
+
<data key="e_label_binary">malicious</data>
|
| 592 |
+
<data key="e_label_confidence">0.7</data>
|
| 593 |
+
<data key="e_suspicion_score">0.25</data>
|
| 594 |
+
<data key="e_mo_name">Data Theft</data>
|
| 595 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 596 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 597 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 598 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 599 |
+
<data key="e_disposition">Unprocessed</data>
|
| 600 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 601 |
+
</edge>
|
| 602 |
+
<edge id="e28" source="679c7530-3a22-11ee-b455-439f5edf4254" target="HOST-2807">
|
| 603 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 604 |
+
<data key="e_timestamp">1710099082</data>
|
| 605 |
+
<data key="e_label_binary">malicious</data>
|
| 606 |
+
<data key="e_label_confidence">0.7</data>
|
| 607 |
+
<data key="e_suspicion_score">0.25</data>
|
| 608 |
+
<data key="e_mo_name">Data Theft</data>
|
| 609 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 610 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 611 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 612 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 613 |
+
<data key="e_disposition">Unprocessed</data>
|
| 614 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 615 |
+
</edge>
|
| 616 |
+
<edge id="e29" source="HOST-2807" target="679c7530-3a22-11ee-b455-439f5edf4254">
|
| 617 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 618 |
+
<data key="e_timestamp">1710099082</data>
|
| 619 |
+
<data key="e_label_binary">malicious</data>
|
| 620 |
+
<data key="e_label_confidence">0.7</data>
|
| 621 |
+
<data key="e_suspicion_score">0.25</data>
|
| 622 |
+
<data key="e_mo_name">Data Theft</data>
|
| 623 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 624 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 625 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 626 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 627 |
+
<data key="e_disposition">Unprocessed</data>
|
| 628 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 629 |
+
</edge>
|
| 630 |
+
<edge id="e30" source="HOST-2824" target="bab5f234-83cb-11ee-8fa6-77181c369f68">
|
| 631 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 632 |
+
<data key="e_timestamp">1710099082</data>
|
| 633 |
+
<data key="e_label_binary">malicious</data>
|
| 634 |
+
<data key="e_label_confidence">0.7</data>
|
| 635 |
+
<data key="e_suspicion_score">0.25</data>
|
| 636 |
+
<data key="e_mo_name">Data Theft</data>
|
| 637 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 638 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 639 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 640 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 641 |
+
<data key="e_disposition">Unprocessed</data>
|
| 642 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 643 |
+
</edge>
|
| 644 |
+
<edge id="e31" source="9fdd3922-09da-11ee-ba30-238fae1b5b6e" target="HOST-2757">
|
| 645 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 646 |
+
<data key="e_timestamp">1710099082</data>
|
| 647 |
+
<data key="e_label_binary">malicious</data>
|
| 648 |
+
<data key="e_label_confidence">0.7</data>
|
| 649 |
+
<data key="e_suspicion_score">0.25</data>
|
| 650 |
+
<data key="e_mo_name">Data Theft</data>
|
| 651 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 652 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 653 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 654 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 655 |
+
<data key="e_disposition">Unprocessed</data>
|
| 656 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 657 |
+
</edge>
|
| 658 |
+
<edge id="e32" source="HOST-2757" target="9fdd3922-09da-11ee-ba30-238fae1b5b6e">
|
| 659 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 660 |
+
<data key="e_timestamp">1710099082</data>
|
| 661 |
+
<data key="e_label_binary">malicious</data>
|
| 662 |
+
<data key="e_label_confidence">0.7</data>
|
| 663 |
+
<data key="e_suspicion_score">0.25</data>
|
| 664 |
+
<data key="e_mo_name">Data Theft</data>
|
| 665 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 666 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 667 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 668 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 669 |
+
<data key="e_disposition">Unprocessed</data>
|
| 670 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 671 |
+
</edge>
|
| 672 |
+
<edge id="e33" source="HOST-2807" target="457bcfd0-0626-11ee-8794-6bae0a4a6dd8">
|
| 673 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 674 |
+
<data key="e_timestamp">1710099082</data>
|
| 675 |
+
<data key="e_label_binary">malicious</data>
|
| 676 |
+
<data key="e_label_confidence">0.7</data>
|
| 677 |
+
<data key="e_suspicion_score">0.25</data>
|
| 678 |
+
<data key="e_mo_name">Data Theft</data>
|
| 679 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 680 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 681 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 682 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 683 |
+
<data key="e_disposition">Unprocessed</data>
|
| 684 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 685 |
+
</edge>
|
| 686 |
+
<edge id="e34" source="61d05073-0626-11ee-87d2-5909d78e9e20" target="HOST-2824">
|
| 687 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 688 |
+
<data key="e_timestamp">1710099082</data>
|
| 689 |
+
<data key="e_label_binary">malicious</data>
|
| 690 |
+
<data key="e_label_confidence">0.7</data>
|
| 691 |
+
<data key="e_suspicion_score">0.25</data>
|
| 692 |
+
<data key="e_mo_name">Data Theft</data>
|
| 693 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 694 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 695 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 696 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 697 |
+
<data key="e_disposition">Unprocessed</data>
|
| 698 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 699 |
+
</edge>
|
| 700 |
+
<edge id="e35" source="HOST-2824" target="61d05073-0626-11ee-87d2-5909d78e9e20">
|
| 701 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 702 |
+
<data key="e_timestamp">1710099082</data>
|
| 703 |
+
<data key="e_label_binary">malicious</data>
|
| 704 |
+
<data key="e_label_confidence">0.7</data>
|
| 705 |
+
<data key="e_suspicion_score">0.25</data>
|
| 706 |
+
<data key="e_mo_name">Data Theft</data>
|
| 707 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 708 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 709 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 710 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 711 |
+
<data key="e_disposition">Unprocessed</data>
|
| 712 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 713 |
+
</edge>
|
| 714 |
+
<edge id="e36" source="5c928290-062b-11ee-b9d7-dfbc3b8151fb" target="HOST-2807">
|
| 715 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 716 |
+
<data key="e_timestamp">1710099082</data>
|
| 717 |
+
<data key="e_label_binary">malicious</data>
|
| 718 |
+
<data key="e_label_confidence">0.7</data>
|
| 719 |
+
<data key="e_suspicion_score">0.25</data>
|
| 720 |
+
<data key="e_mo_name">Data Theft</data>
|
| 721 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 722 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 723 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 724 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 725 |
+
<data key="e_disposition">Unprocessed</data>
|
| 726 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 727 |
+
</edge>
|
| 728 |
+
<edge id="e37" source="HOST-2807" target="5c928290-062b-11ee-b9d7-dfbc3b8151fb">
|
| 729 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 730 |
+
<data key="e_timestamp">1710099082</data>
|
| 731 |
+
<data key="e_label_binary">malicious</data>
|
| 732 |
+
<data key="e_label_confidence">0.7</data>
|
| 733 |
+
<data key="e_suspicion_score">0.25</data>
|
| 734 |
+
<data key="e_mo_name">Data Theft</data>
|
| 735 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 736 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 737 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 738 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 739 |
+
<data key="e_disposition">Unprocessed</data>
|
| 740 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 741 |
+
</edge>
|
| 742 |
+
<edge id="e38" source="HOST-2773" target="627fe5d2-0630-11ee-b4a5-7b67dc16a2f1">
|
| 743 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 744 |
+
<data key="e_timestamp">1710099082</data>
|
| 745 |
+
<data key="e_label_binary">malicious</data>
|
| 746 |
+
<data key="e_label_confidence">0.7</data>
|
| 747 |
+
<data key="e_suspicion_score">0.25</data>
|
| 748 |
+
<data key="e_mo_name">Data Theft</data>
|
| 749 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 750 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 751 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 752 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 753 |
+
<data key="e_disposition">Unprocessed</data>
|
| 754 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 755 |
+
</edge>
|
| 756 |
+
<edge id="e39" source="a2ab6a40-062a-11ee-9792-13ac4ddb104c" target="HOST-2823">
|
| 757 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 758 |
+
<data key="e_timestamp">1710099082</data>
|
| 759 |
+
<data key="e_label_binary">malicious</data>
|
| 760 |
+
<data key="e_label_confidence">0.7</data>
|
| 761 |
+
<data key="e_suspicion_score">0.25</data>
|
| 762 |
+
<data key="e_mo_name">Data Theft</data>
|
| 763 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 764 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 765 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 766 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 767 |
+
<data key="e_disposition">Unprocessed</data>
|
| 768 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 769 |
+
</edge>
|
| 770 |
+
<edge id="e40" source="HOST-2773" target="5ff31ea2-34ce-11ee-b4b4-b5cb39981fef">
|
| 771 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 772 |
+
<data key="e_timestamp">1710099082</data>
|
| 773 |
+
<data key="e_label_binary">malicious</data>
|
| 774 |
+
<data key="e_label_confidence">0.7</data>
|
| 775 |
+
<data key="e_suspicion_score">0.25</data>
|
| 776 |
+
<data key="e_mo_name">Data Theft</data>
|
| 777 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 778 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 779 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 780 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 781 |
+
<data key="e_disposition">Unprocessed</data>
|
| 782 |
+
<data key="e_incident_id">c6f8acf0-df14-11ee-9778-4184b1db151c</data>
|
| 783 |
+
</edge>
|
| 784 |
+
</graph>
|
| 785 |
+
</graphml>
|
graph/incidents_graphml/c/c6fa8d40-ab6c-11ed-b288-05f5e2790b36.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="f09dc891-9fb6-11ed-a695-2d3229ed252d">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.88.92</data>
|
| 35 |
+
<data key="n_hostname">100.64.88.92</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9f96c084-9d8d-11ed-8ff2-3593b92fed96">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.113.78.104</data>
|
| 43 |
+
<data key="n_hostname">10.113.78.104</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="f09dc891-9fb6-11ed-a695-2d3229ed252d" target="HOST-16926">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1676271920</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c6fa8d40-ab6c-11ed-b288-05f5e2790b36</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c6ff4830-ab6c-11ed-b288-05f5e2790b36.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="9f96c084-9d8d-11ed-8ff2-3593b92fed96">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.113.78.104</data>
|
| 35 |
+
<data key="n_hostname">10.113.78.104</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="f09dc891-9fb6-11ed-a695-2d3229ed252d">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.88.92</data>
|
| 43 |
+
<data key="n_hostname">100.64.88.92</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-16926" target="HOST-17530">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1676271920</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c6ff4830-ab6c-11ed-b288-05f5e2790b36</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c7167d60-ddd0-11ee-a342-9d44f1915d3d.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.217.8</data>
|
| 35 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="ba89ffe1-063a-11ee-9f2c-63aa0a31eb0a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.30.78</data>
|
| 43 |
+
<data key="n_hostname">100.64.30.78</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2731" target="HOST-5922">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1709959925</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c7167d60-ddd0-11ee-a342-9d44f1915d3d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c721b500-0cab-11ee-8985-55bb832fcc7f.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="d891b520-0642-11ee-9bd9-51b109f6b127">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.31.15</data>
|
| 35 |
+
<data key="n_hostname">100.64.31.15</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="6b9ddea1-062c-11ee-b3b1-23c171fd7d30">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.72.67</data>
|
| 43 |
+
<data key="n_hostname">100.64.72.67</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="d891b520-0642-11ee-9bd9-51b109f6b127" target="HOST-14279">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1686964241</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c721b500-0cab-11ee-8985-55bb832fcc7f</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c72f7f50-ed53-11ec-8964-796320a841f1.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="159965b0-eb48-11ec-948c-473737dbb93c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">192.168.36.227</data>
|
| 35 |
+
<data key="n_hostname">192.168.36.227</data>
|
| 36 |
+
<data key="n_set_roles">[]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c5386dc2-ebf4-11ec-8e75-d5158505abcd">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.110.41.138</data>
|
| 43 |
+
<data key="n_hostname">10.110.41.138</data>
|
| 44 |
+
<data key="n_set_roles">[]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="159965b0-eb48-11ec-948c-473737dbb93c" target="c5386dc2-ebf4-11ec-8e75-d5158505abcd">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1655370462</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.4375</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">[]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c72f7f50-ed53-11ec-8964-796320a841f1</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="c5386dc2-ebf4-11ec-8e75-d5158505abcd" target="159965b0-eb48-11ec-948c-473737dbb93c">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1655370462</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7</data>
|
| 67 |
+
<data key="e_suspicion_score">0.4375</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">[]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">c72f7f50-ed53-11ec-8964-796320a841f1</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/c/c7374510-3027-11ee-a433-a916fb2bb25a.graphml
ADDED
|
@@ -0,0 +1,169 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="e5ff9cb1-2e36-11ee-a319-f3d9989c38f6">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.69.72</data>
|
| 35 |
+
<data key="n_hostname">100.64.69.72</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.49375</data>
|
| 38 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="13f0b4d9-0626-11ee-86d0-ab9d4a7dffa4">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.68.12</data>
|
| 43 |
+
<data key="n_hostname">100.64.68.12</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.746875</data>
|
| 46 |
+
<data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="820df85b-087a-11ee-bbbe-fd6fe3718a1d">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.69.73</data>
|
| 51 |
+
<data key="n_hostname">100.64.69.73</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.49375</data>
|
| 54 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="21042df8-0626-11ee-a516-e5f53f634990">
|
| 57 |
+
<data key="n_type">SERVICE</data>
|
| 58 |
+
<data key="n_set_roles">["Exploited Service"]</data>
|
| 59 |
+
<data key="n_suspicion_score">0.325</data>
|
| 60 |
+
<data key="n_products">["Precinct"]</data>
|
| 61 |
+
</node>
|
| 62 |
+
<node id="6631938c-2a1c-11ee-94d7-37ee770afd21">
|
| 63 |
+
<data key="n_type">HOST</data>
|
| 64 |
+
<data key="n_ip">100.64.58.41</data>
|
| 65 |
+
<data key="n_hostname">100.64.58.41</data>
|
| 66 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 67 |
+
<data key="n_suspicion_score">0.746875</data>
|
| 68 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 69 |
+
</node>
|
| 70 |
+
<edge id="e1" source="e5ff9cb1-2e36-11ee-a319-f3d9989c38f6" target="HOST-11382">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1690865789</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.746875</data>
|
| 75 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e2" source="HOST-11382" target="e5ff9cb1-2e36-11ee-a319-f3d9989c38f6">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1690865789</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.746875</data>
|
| 89 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e3" source="820df85b-087a-11ee-bbbe-fd6fe3718a1d" target="HOST-11382">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1690865789</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.746875</data>
|
| 103 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
|
| 111 |
+
</edge>
|
| 112 |
+
<edge id="e4" source="HOST-11382" target="820df85b-087a-11ee-bbbe-fd6fe3718a1d">
|
| 113 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 114 |
+
<data key="e_timestamp">1690865789</data>
|
| 115 |
+
<data key="e_label_binary">malicious</data>
|
| 116 |
+
<data key="e_label_confidence">0.746875</data>
|
| 117 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 118 |
+
<data key="e_mo_name">Data Theft</data>
|
| 119 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 120 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 121 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
|
| 122 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 123 |
+
<data key="e_disposition">Disrupted</data>
|
| 124 |
+
<data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
|
| 125 |
+
</edge>
|
| 126 |
+
<edge id="e5" source="HOST-11382" target="HOST-11751">
|
| 127 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 128 |
+
<data key="e_timestamp">1690865789</data>
|
| 129 |
+
<data key="e_label_binary">malicious</data>
|
| 130 |
+
<data key="e_label_confidence">0.746875</data>
|
| 131 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 132 |
+
<data key="e_mo_name">Data Theft</data>
|
| 133 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 134 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 135 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
|
| 136 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 137 |
+
<data key="e_disposition">Disrupted</data>
|
| 138 |
+
<data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
|
| 139 |
+
</edge>
|
| 140 |
+
<edge id="e6" source="HOST-11759" target="HOST-11382">
|
| 141 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 142 |
+
<data key="e_timestamp">1690865789</data>
|
| 143 |
+
<data key="e_label_binary">malicious</data>
|
| 144 |
+
<data key="e_label_confidence">0.746875</data>
|
| 145 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 146 |
+
<data key="e_mo_name">Data Theft</data>
|
| 147 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 148 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 149 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
|
| 150 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 151 |
+
<data key="e_disposition">Disrupted</data>
|
| 152 |
+
<data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
|
| 153 |
+
</edge>
|
| 154 |
+
<edge id="e7" source="HOST-11382" target="HOST-11759">
|
| 155 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 156 |
+
<data key="e_timestamp">1690865789</data>
|
| 157 |
+
<data key="e_label_binary">malicious</data>
|
| 158 |
+
<data key="e_label_confidence">0.746875</data>
|
| 159 |
+
<data key="e_suspicion_score">0.746875</data>
|
| 160 |
+
<data key="e_mo_name">Data Theft</data>
|
| 161 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 162 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 163 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target","Exploited Service"]</data>
|
| 164 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 165 |
+
<data key="e_disposition">Disrupted</data>
|
| 166 |
+
<data key="e_incident_id">c7374510-3027-11ee-a433-a916fb2bb25a</data>
|
| 167 |
+
</edge>
|
| 168 |
+
</graph>
|
| 169 |
+
</graphml>
|
graph/incidents_graphml/c/c73b8d40-ed53-11ec-8964-796320a841f1.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2b2f4833-eb76-11ec-bab8-79b5f5075a8b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.79.176</data>
|
| 35 |
+
<data key="n_hostname">100.64.79.176</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="f1b19f70-ea91-11ec-abf7-619673fe2558">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.71.234</data>
|
| 43 |
+
<data key="n_hostname">100.64.71.234</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="2b2f4833-eb76-11ec-bab8-79b5f5075a8b" target="HOST-12777">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1655370462</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c73b8d40-ed53-11ec-8964-796320a841f1</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-12777" target="2b2f4833-eb76-11ec-bab8-79b5f5075a8b">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1655370462</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">c73b8d40-ed53-11ec-8964-796320a841f1</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/c/c74122b0-2ebf-11ee-9131-1117bdeaaaa3.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="af79fd40-064d-11ee-8da5-17111c999584">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.9.241</data>
|
| 35 |
+
<data key="n_hostname">100.64.9.241</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="da1e4005-062b-11ee-9107-f38fe9e09310">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.71.232</data>
|
| 43 |
+
<data key="n_hostname">100.64.71.232</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="bac191b1-2757-11ee-a5e4-e3920eeeffc4">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.12.193</data>
|
| 51 |
+
<data key="n_hostname">100.64.12.193</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="af79fd40-064d-11ee-8da5-17111c999584" target="da1e4005-062b-11ee-9107-f38fe9e09310">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1690711171</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 61 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Disrupted</data>
|
| 68 |
+
<data key="e_incident_id">c74122b0-2ebf-11ee-9131-1117bdeaaaa3</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="da1e4005-062b-11ee-9107-f38fe9e09310" target="af79fd40-064d-11ee-8da5-17111c999584">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1690711171</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 75 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">c74122b0-2ebf-11ee-9131-1117bdeaaaa3</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="bac191b1-2757-11ee-a5e4-e3920eeeffc4" target="da1e4005-062b-11ee-9107-f38fe9e09310">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1690711171</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 89 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">c74122b0-2ebf-11ee-9131-1117bdeaaaa3</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="da1e4005-062b-11ee-9107-f38fe9e09310" target="bac191b1-2757-11ee-a5e4-e3920eeeffc4">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1690711171</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 103 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">c74122b0-2ebf-11ee-9131-1117bdeaaaa3</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/c/c7418380-1958-11ee-b3de-e709a8260af8.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.70.227</data>
|
| 35 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a56ffcf1-0634-11ee-8c8d-fb1faaa0b25f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.78.243</data>
|
| 43 |
+
<data key="n_hostname">100.64.78.243</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-13083" target="a56ffcf1-0634-11ee-8c8d-fb1faaa0b25f">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688357958</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c7418380-1958-11ee-b3de-e709a8260af8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c746f040-0cab-11ee-8985-55bb832fcc7f.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="6b9ddea1-062c-11ee-b3b1-23c171fd7d30">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.72.67</data>
|
| 35 |
+
<data key="n_hostname">100.64.72.67</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="d891b520-0642-11ee-9bd9-51b109f6b127">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.31.15</data>
|
| 43 |
+
<data key="n_hostname">100.64.31.15</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-14279" target="HOST-16654">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1686964241</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c746f040-0cab-11ee-8985-55bb832fcc7f</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c74f67b0-48e3-11ee-92d0-699b2a8ba251.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.16.232.220</data>
|
| 35 |
+
<data key="n_hostname">172.16.232.220</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2f60a040-3b78-11ee-a913-ff566cafa25c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.43.69</data>
|
| 43 |
+
<data key="n_hostname">100.64.43.69</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2748" target="HOST-7691">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1693585363</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c74f67b0-48e3-11ee-92d0-699b2a8ba251</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c74f6cc0-435f-11ef-9e66-fd84d5bf3736.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="cb524720-29d3-11ef-81d4-df8023cc6201">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.2.181</data>
|
| 35 |
+
<data key="n_hostname">100.64.2.181</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="75a084c1-28f4-11ef-8b71-dd8359e7840d">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.247.113</data>
|
| 43 |
+
<data key="n_hostname">172.24.247.113</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="bc9ad652-28f4-11ef-a77c-efa856b3599e">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.20.107</data>
|
| 51 |
+
<data key="n_hostname">100.64.20.107</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="HOST-5065" target="HOST-5063">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1721126411</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.71875</data>
|
| 61 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Disrupted</data>
|
| 68 |
+
<data key="e_incident_id">c74f6cc0-435f-11ef-9e66-fd84d5bf3736</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="HOST-5063" target="HOST-5065">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1721126411</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.71875</data>
|
| 75 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Disrupted</data>
|
| 82 |
+
<data key="e_incident_id">c74f6cc0-435f-11ef-9e66-fd84d5bf3736</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="bc9ad652-28f4-11ef-a77c-efa856b3599e" target="HOST-5063">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1721126411</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.71875</data>
|
| 89 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Disrupted</data>
|
| 96 |
+
<data key="e_incident_id">c74f6cc0-435f-11ef-9e66-fd84d5bf3736</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="HOST-5063" target="bc9ad652-28f4-11ef-a77c-efa856b3599e">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1721126411</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.71875</data>
|
| 103 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Disrupted</data>
|
| 110 |
+
<data key="e_incident_id">c74f6cc0-435f-11ef-9e66-fd84d5bf3736</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/c/c75a62b0-1958-11ee-b3de-e709a8260af8.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="485ac321-0642-11ee-b879-8fa356303378">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.71.201</data>
|
| 35 |
+
<data key="n_hostname">100.64.71.201</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.70.227</data>
|
| 43 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="485ac321-0642-11ee-b879-8fa356303378" target="HOST-13083">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688357958</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c75a62b0-1958-11ee-b3de-e709a8260af8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="62db6814-137d-11ee-9633-0bc37fed8e1a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.17.75</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-2143.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2be445e1-3a27-11ee-ae3f-8728131a5906">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.207.79.45</data>
|
| 43 |
+
<data key="n_hostname">HOST-18911</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="62db6814-137d-11ee-9633-0bc37fed8e1a" target="HOST-17156">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1704373462</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c764e7e0-ab01-11ee-ace1-1bcda4a2f9d1</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c764f090-435f-11ef-9e66-fd84d5bf3736.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="d3b524d3-28f4-11ef-aead-b741176e73de">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.18.96.192</data>
|
| 35 |
+
<data key="n_hostname">172.18.96.192</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="cde947c1-28f9-11ef-ab77-df296f5b45ef">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.8.211</data>
|
| 43 |
+
<data key="n_hostname">100.64.8.211</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-5336" target="cde947c1-28f9-11ef-ab77-df296f5b45ef">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1721126411</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c764f090-435f-11ef-9e66-fd84d5bf3736</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="cde947c1-28f9-11ef-ab77-df296f5b45ef" target="HOST-5336">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1721126411</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">c764f090-435f-11ef-9e66-fd84d5bf3736</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/c/c767f340-95ae-11ed-94b8-8539433cb390.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="c5884114-eb68-11ec-988c-1dba0e32287f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.5.176</data>
|
| 35 |
+
<data key="n_hostname">100.64.5.176</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2f9f6011-0d42-11ed-964e-f92285ef2afd">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.71.93</data>
|
| 43 |
+
<data key="n_hostname">100.64.71.93</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-13852" target="HOST-13686">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1673881342</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c767f340-95ae-11ed-94b8-8539433cb390</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-13686" target="HOST-13852">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1673881342</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">c767f340-95ae-11ed-94b8-8539433cb390</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/c/c7778580-ab01-11ee-ace1-1bcda4a2f9d1.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2be445e1-3a27-11ee-ae3f-8728131a5906">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.207.79.45</data>
|
| 35 |
+
<data key="n_hostname">HOST-18911</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="62db6814-137d-11ee-9633-0bc37fed8e1a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.17.75</data>
|
| 43 |
+
<data key="n_hostname">USER-0015-2143.example.internal</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17156" target="HOST-18912">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1704373462</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c7778580-ab01-11ee-ace1-1bcda4a2f9d1</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c7781df0-13f4-11ee-9bb8-6b8312f57fd1.graphml
ADDED
|
@@ -0,0 +1,545 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="02416360-1382-11ee-b5ea-d72d376077e2">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.72.210</data>
|
| 35 |
+
<data key="n_hostname">100.64.72.210</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7626953125</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="982bc921-062f-11ee-952c-95ab55abf2b7">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.72.211</data>
|
| 43 |
+
<data key="n_hostname">100.64.72.211</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="ed6e0a40-0631-11ee-be55-af682c51cd88">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.72.212</data>
|
| 51 |
+
<data key="n_hostname">100.64.72.212</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="405b12f0-0643-11ee-93f4-159fa6734fa9">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.71.125</data>
|
| 59 |
+
<data key="n_hostname">100.64.71.125</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 62 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="7407c130-0ca0-11ee-bb87-fd08cd371919">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.72.213</data>
|
| 67 |
+
<data key="n_hostname">100.64.72.213</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 70 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="eff0d5d3-0637-11ee-a699-19fd706a4513">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.72.49</data>
|
| 75 |
+
<data key="n_hostname">100.64.72.49</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 78 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="3c56c8c0-0643-11ee-bb46-852ef6feba5f">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.7.71</data>
|
| 83 |
+
<data key="n_hostname">100.64.7.71</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 86 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="d7cf2414-0624-11ee-a961-f3aa8f0c341a">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.72.214</data>
|
| 91 |
+
<data key="n_hostname">100.64.72.214</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 94 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="3f525be0-064b-11ee-9985-07904b564370">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.38.41</data>
|
| 99 |
+
<data key="n_hostname">100.64.38.41</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 102 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="55c1be00-0643-11ee-9488-69c5977d12da">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.72.215</data>
|
| 107 |
+
<data key="n_hostname">100.64.72.215</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 110 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="1dd1e450-0627-11ee-8ffb-516c3122460e">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.50.138</data>
|
| 115 |
+
<data key="n_hostname">USER-0015-1641.example.internal</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 118 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="381743f2-1270-11ee-827e-818da6a5fbda">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">100.64.72.216</data>
|
| 123 |
+
<data key="n_hostname">100.64.72.216</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 126 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="53c44be0-0639-11ee-9501-6bd93ff6f499">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">100.64.72.217</data>
|
| 131 |
+
<data key="n_hostname">100.64.72.217</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 134 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="f2d5cbe0-06bc-11ee-9979-bb10b4b96e24">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">100.64.72.218</data>
|
| 139 |
+
<data key="n_hostname">100.64.72.218</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 142 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<node id="ac005de2-06b0-11ee-9899-b5805856eb5f">
|
| 145 |
+
<data key="n_type">HOST</data>
|
| 146 |
+
<data key="n_ip">100.64.39.224</data>
|
| 147 |
+
<data key="n_hostname">100.64.39.224</data>
|
| 148 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 149 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 150 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 151 |
+
</node>
|
| 152 |
+
<edge id="e1" source="02416360-1382-11ee-b5ea-d72d376077e2" target="982bc921-062f-11ee-952c-95ab55abf2b7">
|
| 153 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 154 |
+
<data key="e_timestamp">1687765253</data>
|
| 155 |
+
<data key="e_label_binary">malicious</data>
|
| 156 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 157 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 158 |
+
<data key="e_mo_name">Data Theft</data>
|
| 159 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 160 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 161 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 162 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 163 |
+
<data key="e_disposition">Disrupted</data>
|
| 164 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 165 |
+
</edge>
|
| 166 |
+
<edge id="e2" source="982bc921-062f-11ee-952c-95ab55abf2b7" target="02416360-1382-11ee-b5ea-d72d376077e2">
|
| 167 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 168 |
+
<data key="e_timestamp">1687765253</data>
|
| 169 |
+
<data key="e_label_binary">malicious</data>
|
| 170 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 171 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 172 |
+
<data key="e_mo_name">Data Theft</data>
|
| 173 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 174 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 175 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 176 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 177 |
+
<data key="e_disposition">Disrupted</data>
|
| 178 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 179 |
+
</edge>
|
| 180 |
+
<edge id="e3" source="02416360-1382-11ee-b5ea-d72d376077e2" target="ed6e0a40-0631-11ee-be55-af682c51cd88">
|
| 181 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 182 |
+
<data key="e_timestamp">1687765253</data>
|
| 183 |
+
<data key="e_label_binary">malicious</data>
|
| 184 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 185 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 186 |
+
<data key="e_mo_name">Data Theft</data>
|
| 187 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 188 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 189 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 190 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 191 |
+
<data key="e_disposition">Disrupted</data>
|
| 192 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 193 |
+
</edge>
|
| 194 |
+
<edge id="e4" source="ed6e0a40-0631-11ee-be55-af682c51cd88" target="02416360-1382-11ee-b5ea-d72d376077e2">
|
| 195 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 196 |
+
<data key="e_timestamp">1687765253</data>
|
| 197 |
+
<data key="e_label_binary">malicious</data>
|
| 198 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 199 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 200 |
+
<data key="e_mo_name">Data Theft</data>
|
| 201 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 202 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 203 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 204 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 205 |
+
<data key="e_disposition">Disrupted</data>
|
| 206 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 207 |
+
</edge>
|
| 208 |
+
<edge id="e5" source="02416360-1382-11ee-b5ea-d72d376077e2" target="HOST-12984">
|
| 209 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 210 |
+
<data key="e_timestamp">1687765253</data>
|
| 211 |
+
<data key="e_label_binary">malicious</data>
|
| 212 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 213 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 214 |
+
<data key="e_mo_name">Data Theft</data>
|
| 215 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 216 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 217 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 218 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 219 |
+
<data key="e_disposition">Disrupted</data>
|
| 220 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 221 |
+
</edge>
|
| 222 |
+
<edge id="e6" source="HOST-12984" target="02416360-1382-11ee-b5ea-d72d376077e2">
|
| 223 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 224 |
+
<data key="e_timestamp">1687765253</data>
|
| 225 |
+
<data key="e_label_binary">malicious</data>
|
| 226 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 227 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 228 |
+
<data key="e_mo_name">Data Theft</data>
|
| 229 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 230 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 231 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 232 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 233 |
+
<data key="e_disposition">Disrupted</data>
|
| 234 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 235 |
+
</edge>
|
| 236 |
+
<edge id="e7" source="7407c130-0ca0-11ee-bb87-fd08cd371919" target="eff0d5d3-0637-11ee-a699-19fd706a4513">
|
| 237 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 238 |
+
<data key="e_timestamp">1687765253</data>
|
| 239 |
+
<data key="e_label_binary">malicious</data>
|
| 240 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 241 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 242 |
+
<data key="e_mo_name">Data Theft</data>
|
| 243 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 244 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 245 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 246 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 247 |
+
<data key="e_disposition">Disrupted</data>
|
| 248 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 249 |
+
</edge>
|
| 250 |
+
<edge id="e8" source="eff0d5d3-0637-11ee-a699-19fd706a4513" target="7407c130-0ca0-11ee-bb87-fd08cd371919">
|
| 251 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 252 |
+
<data key="e_timestamp">1687765253</data>
|
| 253 |
+
<data key="e_label_binary">malicious</data>
|
| 254 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 255 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 256 |
+
<data key="e_mo_name">Data Theft</data>
|
| 257 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 258 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 259 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 260 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 261 |
+
<data key="e_disposition">Disrupted</data>
|
| 262 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 263 |
+
</edge>
|
| 264 |
+
<edge id="e9" source="02416360-1382-11ee-b5ea-d72d376077e2" target="eff0d5d3-0637-11ee-a699-19fd706a4513">
|
| 265 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 266 |
+
<data key="e_timestamp">1687765253</data>
|
| 267 |
+
<data key="e_label_binary">malicious</data>
|
| 268 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 269 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 270 |
+
<data key="e_mo_name">Data Theft</data>
|
| 271 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 272 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 273 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 274 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 275 |
+
<data key="e_disposition">Disrupted</data>
|
| 276 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 277 |
+
</edge>
|
| 278 |
+
<edge id="e10" source="eff0d5d3-0637-11ee-a699-19fd706a4513" target="02416360-1382-11ee-b5ea-d72d376077e2">
|
| 279 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 280 |
+
<data key="e_timestamp">1687765253</data>
|
| 281 |
+
<data key="e_label_binary">malicious</data>
|
| 282 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 283 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 284 |
+
<data key="e_mo_name">Data Theft</data>
|
| 285 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 286 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 287 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 288 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 289 |
+
<data key="e_disposition">Disrupted</data>
|
| 290 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 291 |
+
</edge>
|
| 292 |
+
<edge id="e11" source="3c56c8c0-0643-11ee-bb46-852ef6feba5f" target="d7cf2414-0624-11ee-a961-f3aa8f0c341a">
|
| 293 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 294 |
+
<data key="e_timestamp">1687765253</data>
|
| 295 |
+
<data key="e_label_binary">malicious</data>
|
| 296 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 297 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 298 |
+
<data key="e_mo_name">Data Theft</data>
|
| 299 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 300 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 301 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 302 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 303 |
+
<data key="e_disposition">Disrupted</data>
|
| 304 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 305 |
+
</edge>
|
| 306 |
+
<edge id="e12" source="d7cf2414-0624-11ee-a961-f3aa8f0c341a" target="3c56c8c0-0643-11ee-bb46-852ef6feba5f">
|
| 307 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 308 |
+
<data key="e_timestamp">1687765253</data>
|
| 309 |
+
<data key="e_label_binary">malicious</data>
|
| 310 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 311 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 312 |
+
<data key="e_mo_name">Data Theft</data>
|
| 313 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 314 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 315 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 316 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 317 |
+
<data key="e_disposition">Disrupted</data>
|
| 318 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 319 |
+
</edge>
|
| 320 |
+
<edge id="e13" source="02416360-1382-11ee-b5ea-d72d376077e2" target="d7cf2414-0624-11ee-a961-f3aa8f0c341a">
|
| 321 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 322 |
+
<data key="e_timestamp">1687765253</data>
|
| 323 |
+
<data key="e_label_binary">malicious</data>
|
| 324 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 325 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 326 |
+
<data key="e_mo_name">Data Theft</data>
|
| 327 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 328 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 329 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 330 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 331 |
+
<data key="e_disposition">Disrupted</data>
|
| 332 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 333 |
+
</edge>
|
| 334 |
+
<edge id="e14" source="d7cf2414-0624-11ee-a961-f3aa8f0c341a" target="02416360-1382-11ee-b5ea-d72d376077e2">
|
| 335 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 336 |
+
<data key="e_timestamp">1687765253</data>
|
| 337 |
+
<data key="e_label_binary">malicious</data>
|
| 338 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 339 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 340 |
+
<data key="e_mo_name">Data Theft</data>
|
| 341 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 342 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 343 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 344 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 345 |
+
<data key="e_disposition">Disrupted</data>
|
| 346 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 347 |
+
</edge>
|
| 348 |
+
<edge id="e15" source="3f525be0-064b-11ee-9985-07904b564370" target="55c1be00-0643-11ee-9488-69c5977d12da">
|
| 349 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 350 |
+
<data key="e_timestamp">1687765253</data>
|
| 351 |
+
<data key="e_label_binary">malicious</data>
|
| 352 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 353 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 354 |
+
<data key="e_mo_name">Data Theft</data>
|
| 355 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 356 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 357 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 358 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 359 |
+
<data key="e_disposition">Disrupted</data>
|
| 360 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 361 |
+
</edge>
|
| 362 |
+
<edge id="e16" source="55c1be00-0643-11ee-9488-69c5977d12da" target="3f525be0-064b-11ee-9985-07904b564370">
|
| 363 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 364 |
+
<data key="e_timestamp">1687765253</data>
|
| 365 |
+
<data key="e_label_binary">malicious</data>
|
| 366 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 367 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 368 |
+
<data key="e_mo_name">Data Theft</data>
|
| 369 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 370 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 371 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 372 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 373 |
+
<data key="e_disposition">Disrupted</data>
|
| 374 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 375 |
+
</edge>
|
| 376 |
+
<edge id="e17" source="02416360-1382-11ee-b5ea-d72d376077e2" target="55c1be00-0643-11ee-9488-69c5977d12da">
|
| 377 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 378 |
+
<data key="e_timestamp">1687765253</data>
|
| 379 |
+
<data key="e_label_binary">malicious</data>
|
| 380 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 381 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 382 |
+
<data key="e_mo_name">Data Theft</data>
|
| 383 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 384 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 385 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 386 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 387 |
+
<data key="e_disposition">Disrupted</data>
|
| 388 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 389 |
+
</edge>
|
| 390 |
+
<edge id="e18" source="55c1be00-0643-11ee-9488-69c5977d12da" target="02416360-1382-11ee-b5ea-d72d376077e2">
|
| 391 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 392 |
+
<data key="e_timestamp">1687765253</data>
|
| 393 |
+
<data key="e_label_binary">malicious</data>
|
| 394 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 395 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 396 |
+
<data key="e_mo_name">Data Theft</data>
|
| 397 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 398 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 399 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 400 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 401 |
+
<data key="e_disposition">Disrupted</data>
|
| 402 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 403 |
+
</edge>
|
| 404 |
+
<edge id="e19" source="1dd1e450-0627-11ee-8ffb-516c3122460e" target="eff0d5d3-0637-11ee-a699-19fd706a4513">
|
| 405 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 406 |
+
<data key="e_timestamp">1687765253</data>
|
| 407 |
+
<data key="e_label_binary">malicious</data>
|
| 408 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 409 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 410 |
+
<data key="e_mo_name">Data Theft</data>
|
| 411 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 412 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 413 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 414 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 415 |
+
<data key="e_disposition">Disrupted</data>
|
| 416 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 417 |
+
</edge>
|
| 418 |
+
<edge id="e20" source="eff0d5d3-0637-11ee-a699-19fd706a4513" target="1dd1e450-0627-11ee-8ffb-516c3122460e">
|
| 419 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 420 |
+
<data key="e_timestamp">1687765253</data>
|
| 421 |
+
<data key="e_label_binary">malicious</data>
|
| 422 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 423 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 424 |
+
<data key="e_mo_name">Data Theft</data>
|
| 425 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 426 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 427 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 428 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 429 |
+
<data key="e_disposition">Disrupted</data>
|
| 430 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 431 |
+
</edge>
|
| 432 |
+
<edge id="e21" source="381743f2-1270-11ee-827e-818da6a5fbda" target="d7cf2414-0624-11ee-a961-f3aa8f0c341a">
|
| 433 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 434 |
+
<data key="e_timestamp">1687765253</data>
|
| 435 |
+
<data key="e_label_binary">malicious</data>
|
| 436 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 437 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 438 |
+
<data key="e_mo_name">Data Theft</data>
|
| 439 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 440 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 441 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 442 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 443 |
+
<data key="e_disposition">Disrupted</data>
|
| 444 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 445 |
+
</edge>
|
| 446 |
+
<edge id="e22" source="d7cf2414-0624-11ee-a961-f3aa8f0c341a" target="381743f2-1270-11ee-827e-818da6a5fbda">
|
| 447 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 448 |
+
<data key="e_timestamp">1687765253</data>
|
| 449 |
+
<data key="e_label_binary">malicious</data>
|
| 450 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 451 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 452 |
+
<data key="e_mo_name">Data Theft</data>
|
| 453 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 454 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 455 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 456 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 457 |
+
<data key="e_disposition">Disrupted</data>
|
| 458 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 459 |
+
</edge>
|
| 460 |
+
<edge id="e23" source="53c44be0-0639-11ee-9501-6bd93ff6f499" target="982bc921-062f-11ee-952c-95ab55abf2b7">
|
| 461 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 462 |
+
<data key="e_timestamp">1687765253</data>
|
| 463 |
+
<data key="e_label_binary">malicious</data>
|
| 464 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 465 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 466 |
+
<data key="e_mo_name">Data Theft</data>
|
| 467 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 468 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 469 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 470 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 471 |
+
<data key="e_disposition">Disrupted</data>
|
| 472 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 473 |
+
</edge>
|
| 474 |
+
<edge id="e24" source="982bc921-062f-11ee-952c-95ab55abf2b7" target="53c44be0-0639-11ee-9501-6bd93ff6f499">
|
| 475 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 476 |
+
<data key="e_timestamp">1687765253</data>
|
| 477 |
+
<data key="e_label_binary">malicious</data>
|
| 478 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 479 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 480 |
+
<data key="e_mo_name">Data Theft</data>
|
| 481 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 482 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 483 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 484 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 485 |
+
<data key="e_disposition">Disrupted</data>
|
| 486 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 487 |
+
</edge>
|
| 488 |
+
<edge id="e25" source="f2d5cbe0-06bc-11ee-9979-bb10b4b96e24" target="d7cf2414-0624-11ee-a961-f3aa8f0c341a">
|
| 489 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 490 |
+
<data key="e_timestamp">1687765253</data>
|
| 491 |
+
<data key="e_label_binary">malicious</data>
|
| 492 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 493 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 494 |
+
<data key="e_mo_name">Data Theft</data>
|
| 495 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 496 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 497 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 498 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 499 |
+
<data key="e_disposition">Disrupted</data>
|
| 500 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 501 |
+
</edge>
|
| 502 |
+
<edge id="e26" source="d7cf2414-0624-11ee-a961-f3aa8f0c341a" target="f2d5cbe0-06bc-11ee-9979-bb10b4b96e24">
|
| 503 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 504 |
+
<data key="e_timestamp">1687765253</data>
|
| 505 |
+
<data key="e_label_binary">malicious</data>
|
| 506 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 507 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 508 |
+
<data key="e_mo_name">Data Theft</data>
|
| 509 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 510 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 511 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 512 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 513 |
+
<data key="e_disposition">Disrupted</data>
|
| 514 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 515 |
+
</edge>
|
| 516 |
+
<edge id="e27" source="ac005de2-06b0-11ee-9899-b5805856eb5f" target="HOST-12984">
|
| 517 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 518 |
+
<data key="e_timestamp">1687765253</data>
|
| 519 |
+
<data key="e_label_binary">malicious</data>
|
| 520 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 521 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 522 |
+
<data key="e_mo_name">Data Theft</data>
|
| 523 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 524 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 525 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 526 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 527 |
+
<data key="e_disposition">Disrupted</data>
|
| 528 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 529 |
+
</edge>
|
| 530 |
+
<edge id="e28" source="HOST-12984" target="ac005de2-06b0-11ee-9899-b5805856eb5f">
|
| 531 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 532 |
+
<data key="e_timestamp">1687765253</data>
|
| 533 |
+
<data key="e_label_binary">malicious</data>
|
| 534 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 535 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 536 |
+
<data key="e_mo_name">Data Theft</data>
|
| 537 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 538 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 539 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 540 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 541 |
+
<data key="e_disposition">Disrupted</data>
|
| 542 |
+
<data key="e_incident_id">c7781df0-13f4-11ee-9bb8-6b8312f57fd1</data>
|
| 543 |
+
</edge>
|
| 544 |
+
</graph>
|
| 545 |
+
</graphml>
|
graph/incidents_graphml/c/c779f8a0-1958-11ee-b3de-e709a8260af8.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.70.227</data>
|
| 35 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="485ac321-0642-11ee-b879-8fa356303378">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.71.201</data>
|
| 43 |
+
<data key="n_hostname">100.64.71.201</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-13083" target="HOST-15047">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688357959</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c779f8a0-1958-11ee-b3de-e709a8260af8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c788a5e0-276b-11ef-b363-fdc4064c84e0.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="65fe0a20-2a4d-11ee-8fba-fd7894b61cab">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.20.130.86</data>
|
| 35 |
+
<data key="n_hostname">172.20.130.86</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Windows Active Directory","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="39cdb773-0644-11ee-8627-057c6d9a7baf">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.92.70</data>
|
| 43 |
+
<data key="n_hostname">100.64.92.70</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="65fe0a20-2a4d-11ee-8fba-fd7894b61cab" target="39cdb773-0644-11ee-8627-057c6d9a7baf">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1718052933</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c788a5e0-276b-11ef-b363-fdc4064c84e0</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="39cdb773-0644-11ee-8627-057c6d9a7baf" target="65fe0a20-2a4d-11ee-8fba-fd7894b61cab">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1718052933</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">c788a5e0-276b-11ef-b363-fdc4064c84e0</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/c/c7892d60-a113-11ed-b936-1349c6e38dc6.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="bb1f11d0-9edd-11ed-8759-7b815aa44f43">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.86.141</data>
|
| 35 |
+
<data key="n_hostname">100.64.86.141</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9f9783d0-9d8d-11ed-8ff2-3593b92fed96">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.184.211.180</data>
|
| 43 |
+
<data key="n_hostname">100.64.6.51</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="bb1f11d0-9edd-11ed-8759-7b815aa44f43" target="HOST-17146">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1675134184</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c7892d60-a113-11ed-b936-1349c6e38dc6</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c78c9420-ab01-11ee-ace1-1bcda4a2f9d1.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="c57e2685-ab01-11ee-9513-bfa421390b70">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.95.222</data>
|
| 35 |
+
<data key="n_hostname">100.64.95.222</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="8b36c395-0626-11ee-ad14-25a724519715">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.184.211.180</data>
|
| 43 |
+
<data key="n_hostname">100.64.6.51</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="c57e2685-ab01-11ee-9513-bfa421390b70" target="HOST-17429">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1704373462</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c78c9420-ab01-11ee-ace1-1bcda4a2f9d1</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c78e8490-a113-11ed-b936-1349c6e38dc6.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="9f9783d0-9d8d-11ed-8ff2-3593b92fed96">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.184.211.180</data>
|
| 35 |
+
<data key="n_hostname">100.64.6.51</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="bb1f11d0-9edd-11ed-8759-7b815aa44f43">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.86.141</data>
|
| 43 |
+
<data key="n_hostname">100.64.86.141</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17146" target="HOST-17195">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1675134184</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c78e8490-a113-11ed-b936-1349c6e38dc6</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c7a0fc90-8d5f-11ee-9951-411438339097.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="fff5e732-26d1-11ee-b20b-598a61e4a387">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.9.187</data>
|
| 35 |
+
<data key="n_hostname">100.64.9.187</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.49375</data>
|
| 38 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c2d811c4-72a3-11ee-b250-3f44308bc5b2">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.68.20</data>
|
| 43 |
+
<data key="n_hostname">100.64.68.20</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.6625</data>
|
| 46 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="fff5e732-26d1-11ee-b20b-598a61e4a387" target="c2d811c4-72a3-11ee-b250-3f44308bc5b2">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1701115300</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.6625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c7a0fc90-8d5f-11ee-9951-411438339097</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="c2d811c4-72a3-11ee-b250-3f44308bc5b2" target="fff5e732-26d1-11ee-b20b-598a61e4a387">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1701115300</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7</data>
|
| 67 |
+
<data key="e_suspicion_score">0.6625</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">c7a0fc90-8d5f-11ee-9951-411438339097</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/c/c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="8b36c395-0626-11ee-ad14-25a724519715">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.184.211.180</data>
|
| 35 |
+
<data key="n_hostname">100.64.6.51</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c57e2685-ab01-11ee-9513-bfa421390b70">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.95.222</data>
|
| 43 |
+
<data key="n_hostname">100.64.95.222</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17429" target="HOST-18913">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1704373462</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c7a3c5a0-ab01-11ee-ace1-1bcda4a2f9d1</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c7a91ef0-1958-11ee-b3de-e709a8260af8.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="4d4706e2-0643-11ee-a1c0-af40b19a49a7">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.78.244</data>
|
| 35 |
+
<data key="n_hostname">100.64.78.244</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.70.227</data>
|
| 43 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="4d4706e2-0643-11ee-a1c0-af40b19a49a7" target="HOST-13083">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688357959</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c7a91ef0-1958-11ee-b3de-e709a8260af8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c7b0b290-2701-11ed-bc1f-0928ad8774f3.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b8482ab7-f360-11ec-a2fa-2b3ef270b4f7">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.18.10.137</data>
|
| 35 |
+
<data key="n_hostname">172.18.10.137</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Windows Active Directory"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e7036e4a-fe60-11ec-945a-9d18e441551f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.85.108</data>
|
| 43 |
+
<data key="n_hostname">100.64.85.108</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="b8482ab7-f360-11ec-a2fa-2b3ef270b4f7" target="e7036e4a-fe60-11ec-945a-9d18e441551f">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1661712411</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.4375</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c7b0b290-2701-11ed-bc1f-0928ad8774f3</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="e7036e4a-fe60-11ec-945a-9d18e441551f" target="b8482ab7-f360-11ec-a2fa-2b3ef270b4f7">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1661712411</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7</data>
|
| 67 |
+
<data key="e_suspicion_score">0.4375</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">c7b0b290-2701-11ed-bc1f-0928ad8774f3</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/c/c7b63020-0b80-11ef-b87c-0d8b17cd9fbf.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2fae4744-1248-11ee-9633-0bc37fed8e1a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.17.248</data>
|
| 35 |
+
<data key="n_hostname">100.64.17.248</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9ff29330-0627-11ee-ad14-25a724519715">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.113.78.104</data>
|
| 43 |
+
<data key="n_hostname">10.113.78.104</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="a8e1aa11-2d02-11ee-abcd-a338ffca27fd">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.94.161</data>
|
| 51 |
+
<data key="n_hostname">USER-0015-2120.example.internal</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="2fae4744-1248-11ee-9633-0bc37fed8e1a" target="HOST-16999">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1714983320</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.7</data>
|
| 61 |
+
<data key="e_suspicion_score">0.25</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Unprocessed</data>
|
| 68 |
+
<data key="e_incident_id">c7b63020-0b80-11ef-b87c-0d8b17cd9fbf</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="HOST-16999" target="2fae4744-1248-11ee-9633-0bc37fed8e1a">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1714983320</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.7</data>
|
| 75 |
+
<data key="e_suspicion_score">0.25</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Unprocessed</data>
|
| 82 |
+
<data key="e_incident_id">c7b63020-0b80-11ef-b87c-0d8b17cd9fbf</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="a8e1aa11-2d02-11ee-abcd-a338ffca27fd" target="HOST-16999">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1714983320</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.7</data>
|
| 89 |
+
<data key="e_suspicion_score">0.25</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Unprocessed</data>
|
| 96 |
+
<data key="e_incident_id">c7b63020-0b80-11ef-b87c-0d8b17cd9fbf</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="HOST-16999" target="a8e1aa11-2d02-11ee-abcd-a338ffca27fd">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1714983320</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.7</data>
|
| 103 |
+
<data key="e_suspicion_score">0.25</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Unprocessed</data>
|
| 110 |
+
<data key="e_incident_id">c7b63020-0b80-11ef-b87c-0d8b17cd9fbf</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/c/c7b6da90-33da-11ed-bcaf-e3fcd610a254.graphml
ADDED
|
@@ -0,0 +1,783 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ef6bf530-ea91-11ec-90c7-eff83c975df3">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.72.77</data>
|
| 35 |
+
<data key="n_hostname">100.64.72.77</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="def619a1-026b-11ed-9955-cd1e11715b9d">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.73.21</data>
|
| 43 |
+
<data key="n_hostname">100.64.73.21</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.930390625</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="c220b891-32e4-11ed-bd62-35a35d83109f">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.82.81</data>
|
| 51 |
+
<data key="n_hostname">100.64.82.81</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="f92ff530-ea91-11ec-abf7-619673fe2558">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.72.109</data>
|
| 59 |
+
<data key="n_hostname">100.64.72.109</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.841796875</data>
|
| 62 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="6f035ac4-33c8-11ed-bfee-7f21394fcb29">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.82.82</data>
|
| 67 |
+
<data key="n_hostname">100.64.82.82</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 70 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="66a42b01-032d-11ed-87c7-811af63692d8">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.82.83</data>
|
| 75 |
+
<data key="n_hostname">100.64.82.83</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 78 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="e510be40-ea91-11ec-90c7-eff83c975df3">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.73.72</data>
|
| 83 |
+
<data key="n_hostname">100.64.73.72</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 86 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="d489b512-14c9-11ed-a4d8-07ba3f20e566">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.77.103</data>
|
| 91 |
+
<data key="n_hostname">100.64.77.103</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 94 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="f7b3dc80-ea91-11ec-abf7-619673fe2558">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.73.51</data>
|
| 99 |
+
<data key="n_hostname">100.64.73.51</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 102 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="561723a2-19b7-11ed-88a2-8f534cb727b0">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.82.84</data>
|
| 107 |
+
<data key="n_hostname">100.64.82.84</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.68359375</data>
|
| 110 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="e3599860-ea91-11ec-90c7-eff83c975df3">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.72.118</data>
|
| 115 |
+
<data key="n_hostname">100.64.72.118</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 118 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="f62d3c80-ea91-11ec-abf7-619673fe2558">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">100.64.71.237</data>
|
| 123 |
+
<data key="n_hostname">100.64.71.237</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 126 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="6e8709d1-09ce-11ed-8433-8d9635f8f09c">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">100.64.82.85</data>
|
| 131 |
+
<data key="n_hostname">100.64.82.85</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 134 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="6b83a6d4-eb6f-11ec-97c9-c14f7cc7e2b1">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">100.64.82.86</data>
|
| 139 |
+
<data key="n_hostname">100.64.82.86</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 142 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<node id="3eab20d0-ea92-11ec-90c7-eff83c975df3">
|
| 145 |
+
<data key="n_type">HOST</data>
|
| 146 |
+
<data key="n_ip">100.64.71.238</data>
|
| 147 |
+
<data key="n_hostname">100.64.71.238</data>
|
| 148 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 149 |
+
<data key="n_suspicion_score">0.841796875</data>
|
| 150 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 151 |
+
</node>
|
| 152 |
+
<node id="d9411f85-29fa-11ed-b223-bddde7e3fc8b">
|
| 153 |
+
<data key="n_type">HOST</data>
|
| 154 |
+
<data key="n_ip">100.64.82.87</data>
|
| 155 |
+
<data key="n_hostname">100.64.82.87</data>
|
| 156 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 157 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 158 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 159 |
+
</node>
|
| 160 |
+
<node id="d1b88ba0-ec64-11ec-bd01-f7823eb190cd">
|
| 161 |
+
<data key="n_type">HOST</data>
|
| 162 |
+
<data key="n_ip">100.64.82.88</data>
|
| 163 |
+
<data key="n_hostname">100.64.82.88</data>
|
| 164 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 165 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 166 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 167 |
+
</node>
|
| 168 |
+
<node id="ccb6e861-267d-11ed-a281-c1fab458b95d">
|
| 169 |
+
<data key="n_type">HOST</data>
|
| 170 |
+
<data key="n_ip">100.64.82.89</data>
|
| 171 |
+
<data key="n_hostname">100.64.82.89</data>
|
| 172 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 173 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 174 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 175 |
+
</node>
|
| 176 |
+
<node id="084aa654-32db-11ed-a658-6738815b545a">
|
| 177 |
+
<data key="n_type">HOST</data>
|
| 178 |
+
<data key="n_ip">100.64.82.90</data>
|
| 179 |
+
<data key="n_hostname">100.64.82.90</data>
|
| 180 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 181 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 182 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 183 |
+
</node>
|
| 184 |
+
<node id="e6990751-0d40-11ed-9b66-1fa3f6da16ca">
|
| 185 |
+
<data key="n_type">HOST</data>
|
| 186 |
+
<data key="n_ip">100.64.72.73</data>
|
| 187 |
+
<data key="n_hostname">100.64.72.73</data>
|
| 188 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 189 |
+
<data key="n_suspicion_score">0.841796875</data>
|
| 190 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 191 |
+
</node>
|
| 192 |
+
<node id="2f07c422-33c7-11ed-bfee-7f21394fcb29">
|
| 193 |
+
<data key="n_type">HOST</data>
|
| 194 |
+
<data key="n_ip">100.64.82.91</data>
|
| 195 |
+
<data key="n_hostname">100.64.82.91</data>
|
| 196 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 197 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 198 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 199 |
+
</node>
|
| 200 |
+
<node id="c03bc4b2-33d0-11ed-8138-e78ae9325a59">
|
| 201 |
+
<data key="n_type">HOST</data>
|
| 202 |
+
<data key="n_ip">100.64.82.92</data>
|
| 203 |
+
<data key="n_hostname">100.64.82.92</data>
|
| 204 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 205 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 206 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 207 |
+
</node>
|
| 208 |
+
<edge id="e1" source="HOST-12865" target="HOST-13202">
|
| 209 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 210 |
+
<data key="e_timestamp">1663125026</data>
|
| 211 |
+
<data key="e_label_binary">malicious</data>
|
| 212 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 213 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 214 |
+
<data key="e_mo_name">Data Theft</data>
|
| 215 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 216 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 217 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 218 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 219 |
+
<data key="e_disposition">Disrupted</data>
|
| 220 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 221 |
+
</edge>
|
| 222 |
+
<edge id="e2" source="c220b891-32e4-11ed-bd62-35a35d83109f" target="HOST-14542">
|
| 223 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 224 |
+
<data key="e_timestamp">1663125026</data>
|
| 225 |
+
<data key="e_label_binary">malicious</data>
|
| 226 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 227 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 228 |
+
<data key="e_mo_name">Data Theft</data>
|
| 229 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 230 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 231 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 232 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 233 |
+
<data key="e_disposition">Disrupted</data>
|
| 234 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 235 |
+
</edge>
|
| 236 |
+
<edge id="e3" source="HOST-14542" target="c220b891-32e4-11ed-bd62-35a35d83109f">
|
| 237 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 238 |
+
<data key="e_timestamp">1663125026</data>
|
| 239 |
+
<data key="e_label_binary">malicious</data>
|
| 240 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 241 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 242 |
+
<data key="e_mo_name">Data Theft</data>
|
| 243 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 244 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 245 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 246 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 247 |
+
<data key="e_disposition">Disrupted</data>
|
| 248 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 249 |
+
</edge>
|
| 250 |
+
<edge id="e4" source="6f035ac4-33c8-11ed-bfee-7f21394fcb29" target="HOST-14542">
|
| 251 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 252 |
+
<data key="e_timestamp">1663125026</data>
|
| 253 |
+
<data key="e_label_binary">malicious</data>
|
| 254 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 255 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 256 |
+
<data key="e_mo_name">Data Theft</data>
|
| 257 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 258 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 259 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 260 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 261 |
+
<data key="e_disposition">Disrupted</data>
|
| 262 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 263 |
+
</edge>
|
| 264 |
+
<edge id="e5" source="HOST-14542" target="6f035ac4-33c8-11ed-bfee-7f21394fcb29">
|
| 265 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 266 |
+
<data key="e_timestamp">1663125026</data>
|
| 267 |
+
<data key="e_label_binary">malicious</data>
|
| 268 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 269 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 270 |
+
<data key="e_mo_name">Data Theft</data>
|
| 271 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 272 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 273 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 274 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 275 |
+
<data key="e_disposition">Disrupted</data>
|
| 276 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 277 |
+
</edge>
|
| 278 |
+
<edge id="e6" source="HOST-13202" target="HOST-14542">
|
| 279 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 280 |
+
<data key="e_timestamp">1663125026</data>
|
| 281 |
+
<data key="e_label_binary">malicious</data>
|
| 282 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 283 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 284 |
+
<data key="e_mo_name">Data Theft</data>
|
| 285 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 286 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 287 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 288 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 289 |
+
<data key="e_disposition">Disrupted</data>
|
| 290 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 291 |
+
</edge>
|
| 292 |
+
<edge id="e7" source="HOST-14542" target="HOST-13202">
|
| 293 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 294 |
+
<data key="e_timestamp">1663125026</data>
|
| 295 |
+
<data key="e_label_binary">malicious</data>
|
| 296 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 297 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 298 |
+
<data key="e_mo_name">Data Theft</data>
|
| 299 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 300 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 301 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 302 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 303 |
+
<data key="e_disposition">Disrupted</data>
|
| 304 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 305 |
+
</edge>
|
| 306 |
+
<edge id="e8" source="66a42b01-032d-11ed-87c7-811af63692d8" target="HOST-13775">
|
| 307 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 308 |
+
<data key="e_timestamp">1663125026</data>
|
| 309 |
+
<data key="e_label_binary">malicious</data>
|
| 310 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 311 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 312 |
+
<data key="e_mo_name">Data Theft</data>
|
| 313 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 314 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 315 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 316 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 317 |
+
<data key="e_disposition">Disrupted</data>
|
| 318 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 319 |
+
</edge>
|
| 320 |
+
<edge id="e9" source="HOST-13775" target="66a42b01-032d-11ed-87c7-811af63692d8">
|
| 321 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 322 |
+
<data key="e_timestamp">1663125026</data>
|
| 323 |
+
<data key="e_label_binary">malicious</data>
|
| 324 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 325 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 326 |
+
<data key="e_mo_name">Data Theft</data>
|
| 327 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 328 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 329 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 330 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 331 |
+
<data key="e_disposition">Disrupted</data>
|
| 332 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 333 |
+
</edge>
|
| 334 |
+
<edge id="e10" source="HOST-14483" target="HOST-13208">
|
| 335 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 336 |
+
<data key="e_timestamp">1663125026</data>
|
| 337 |
+
<data key="e_label_binary">malicious</data>
|
| 338 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 339 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 340 |
+
<data key="e_mo_name">Data Theft</data>
|
| 341 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 342 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 343 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 344 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 345 |
+
<data key="e_disposition">Disrupted</data>
|
| 346 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 347 |
+
</edge>
|
| 348 |
+
<edge id="e11" source="HOST-13208" target="HOST-14483">
|
| 349 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 350 |
+
<data key="e_timestamp">1663125026</data>
|
| 351 |
+
<data key="e_label_binary">malicious</data>
|
| 352 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 353 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 354 |
+
<data key="e_mo_name">Data Theft</data>
|
| 355 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 356 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 357 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 358 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 359 |
+
<data key="e_disposition">Disrupted</data>
|
| 360 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 361 |
+
</edge>
|
| 362 |
+
<edge id="e12" source="561723a2-19b7-11ed-88a2-8f534cb727b0" target="HOST-13208">
|
| 363 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 364 |
+
<data key="e_timestamp">1663125026</data>
|
| 365 |
+
<data key="e_label_binary">malicious</data>
|
| 366 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 367 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 368 |
+
<data key="e_mo_name">Data Theft</data>
|
| 369 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 370 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 371 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 372 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 373 |
+
<data key="e_disposition">Disrupted</data>
|
| 374 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 375 |
+
</edge>
|
| 376 |
+
<edge id="e13" source="HOST-13208" target="561723a2-19b7-11ed-88a2-8f534cb727b0">
|
| 377 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 378 |
+
<data key="e_timestamp">1663125026</data>
|
| 379 |
+
<data key="e_label_binary">malicious</data>
|
| 380 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 381 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 382 |
+
<data key="e_mo_name">Data Theft</data>
|
| 383 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 384 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 385 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 386 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 387 |
+
<data key="e_disposition">Disrupted</data>
|
| 388 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 389 |
+
</edge>
|
| 390 |
+
<edge id="e14" source="561723a2-19b7-11ed-88a2-8f534cb727b0" target="HOST-14549">
|
| 391 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 392 |
+
<data key="e_timestamp">1663125026</data>
|
| 393 |
+
<data key="e_label_binary">malicious</data>
|
| 394 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 395 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 396 |
+
<data key="e_mo_name">Data Theft</data>
|
| 397 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 398 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 399 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 400 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 401 |
+
<data key="e_disposition">Disrupted</data>
|
| 402 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 403 |
+
</edge>
|
| 404 |
+
<edge id="e15" source="HOST-14549" target="561723a2-19b7-11ed-88a2-8f534cb727b0">
|
| 405 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 406 |
+
<data key="e_timestamp">1663125026</data>
|
| 407 |
+
<data key="e_label_binary">malicious</data>
|
| 408 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 409 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 410 |
+
<data key="e_mo_name">Data Theft</data>
|
| 411 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 412 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 413 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 414 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 415 |
+
<data key="e_disposition">Disrupted</data>
|
| 416 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 417 |
+
</edge>
|
| 418 |
+
<edge id="e16" source="561723a2-19b7-11ed-88a2-8f534cb727b0" target="HOST-12780">
|
| 419 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 420 |
+
<data key="e_timestamp">1663125026</data>
|
| 421 |
+
<data key="e_label_binary">malicious</data>
|
| 422 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 423 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 424 |
+
<data key="e_mo_name">Data Theft</data>
|
| 425 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 426 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 427 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 428 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 429 |
+
<data key="e_disposition">Disrupted</data>
|
| 430 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 431 |
+
</edge>
|
| 432 |
+
<edge id="e17" source="HOST-12780" target="561723a2-19b7-11ed-88a2-8f534cb727b0">
|
| 433 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 434 |
+
<data key="e_timestamp">1663125026</data>
|
| 435 |
+
<data key="e_label_binary">malicious</data>
|
| 436 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 437 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 438 |
+
<data key="e_mo_name">Data Theft</data>
|
| 439 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 440 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 441 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 442 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 443 |
+
<data key="e_disposition">Disrupted</data>
|
| 444 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 445 |
+
</edge>
|
| 446 |
+
<edge id="e18" source="66a42b01-032d-11ed-87c7-811af63692d8" target="HOST-12780">
|
| 447 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 448 |
+
<data key="e_timestamp">1663125026</data>
|
| 449 |
+
<data key="e_label_binary">malicious</data>
|
| 450 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 451 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 452 |
+
<data key="e_mo_name">Data Theft</data>
|
| 453 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 454 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 455 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 456 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 457 |
+
<data key="e_disposition">Disrupted</data>
|
| 458 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 459 |
+
</edge>
|
| 460 |
+
<edge id="e19" source="HOST-12780" target="66a42b01-032d-11ed-87c7-811af63692d8">
|
| 461 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 462 |
+
<data key="e_timestamp">1663125026</data>
|
| 463 |
+
<data key="e_label_binary">malicious</data>
|
| 464 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 465 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 466 |
+
<data key="e_mo_name">Data Theft</data>
|
| 467 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 468 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 469 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 470 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 471 |
+
<data key="e_disposition">Disrupted</data>
|
| 472 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 473 |
+
</edge>
|
| 474 |
+
<edge id="e20" source="HOST-13202" target="HOST-14549">
|
| 475 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 476 |
+
<data key="e_timestamp">1663125026</data>
|
| 477 |
+
<data key="e_label_binary">malicious</data>
|
| 478 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 479 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 480 |
+
<data key="e_mo_name">Data Theft</data>
|
| 481 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 482 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 483 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 484 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 485 |
+
<data key="e_disposition">Disrupted</data>
|
| 486 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 487 |
+
</edge>
|
| 488 |
+
<edge id="e21" source="HOST-14549" target="HOST-13202">
|
| 489 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 490 |
+
<data key="e_timestamp">1663125026</data>
|
| 491 |
+
<data key="e_label_binary">malicious</data>
|
| 492 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 493 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 494 |
+
<data key="e_mo_name">Data Theft</data>
|
| 495 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 496 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 497 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 498 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 499 |
+
<data key="e_disposition">Disrupted</data>
|
| 500 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 501 |
+
</edge>
|
| 502 |
+
<edge id="e22" source="6e8709d1-09ce-11ed-8433-8d9635f8f09c" target="HOST-14542">
|
| 503 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 504 |
+
<data key="e_timestamp">1663125026</data>
|
| 505 |
+
<data key="e_label_binary">malicious</data>
|
| 506 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 507 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 508 |
+
<data key="e_mo_name">Data Theft</data>
|
| 509 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 510 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 511 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 512 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 513 |
+
<data key="e_disposition">Disrupted</data>
|
| 514 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 515 |
+
</edge>
|
| 516 |
+
<edge id="e23" source="HOST-14542" target="6e8709d1-09ce-11ed-8433-8d9635f8f09c">
|
| 517 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 518 |
+
<data key="e_timestamp">1663125026</data>
|
| 519 |
+
<data key="e_label_binary">malicious</data>
|
| 520 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 521 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 522 |
+
<data key="e_mo_name">Data Theft</data>
|
| 523 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 524 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 525 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 526 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 527 |
+
<data key="e_disposition">Disrupted</data>
|
| 528 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 529 |
+
</edge>
|
| 530 |
+
<edge id="e24" source="6b83a6d4-eb6f-11ec-97c9-c14f7cc7e2b1" target="HOST-12782">
|
| 531 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 532 |
+
<data key="e_timestamp">1663125026</data>
|
| 533 |
+
<data key="e_label_binary">malicious</data>
|
| 534 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 535 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 536 |
+
<data key="e_mo_name">Data Theft</data>
|
| 537 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 538 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 539 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 540 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 541 |
+
<data key="e_disposition">Disrupted</data>
|
| 542 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 543 |
+
</edge>
|
| 544 |
+
<edge id="e25" source="HOST-12782" target="6b83a6d4-eb6f-11ec-97c9-c14f7cc7e2b1">
|
| 545 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 546 |
+
<data key="e_timestamp">1663125026</data>
|
| 547 |
+
<data key="e_label_binary">malicious</data>
|
| 548 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 549 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 550 |
+
<data key="e_mo_name">Data Theft</data>
|
| 551 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 552 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 553 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 554 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 555 |
+
<data key="e_disposition">Disrupted</data>
|
| 556 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 557 |
+
</edge>
|
| 558 |
+
<edge id="e26" source="d9411f85-29fa-11ed-b223-bddde7e3fc8b" target="HOST-12782">
|
| 559 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 560 |
+
<data key="e_timestamp">1663125026</data>
|
| 561 |
+
<data key="e_label_binary">malicious</data>
|
| 562 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 563 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 564 |
+
<data key="e_mo_name">Data Theft</data>
|
| 565 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 566 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 567 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 568 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 569 |
+
<data key="e_disposition">Disrupted</data>
|
| 570 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 571 |
+
</edge>
|
| 572 |
+
<edge id="e27" source="HOST-12782" target="d9411f85-29fa-11ed-b223-bddde7e3fc8b">
|
| 573 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 574 |
+
<data key="e_timestamp">1663125026</data>
|
| 575 |
+
<data key="e_label_binary">malicious</data>
|
| 576 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 577 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 578 |
+
<data key="e_mo_name">Data Theft</data>
|
| 579 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 580 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 581 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 582 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 583 |
+
<data key="e_disposition">Disrupted</data>
|
| 584 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 585 |
+
</edge>
|
| 586 |
+
<edge id="e28" source="d1b88ba0-ec64-11ec-bd01-f7823eb190cd" target="HOST-12782">
|
| 587 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 588 |
+
<data key="e_timestamp">1663125026</data>
|
| 589 |
+
<data key="e_label_binary">malicious</data>
|
| 590 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 591 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 592 |
+
<data key="e_mo_name">Data Theft</data>
|
| 593 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 594 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 595 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 596 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 597 |
+
<data key="e_disposition">Disrupted</data>
|
| 598 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 599 |
+
</edge>
|
| 600 |
+
<edge id="e29" source="HOST-12782" target="d1b88ba0-ec64-11ec-bd01-f7823eb190cd">
|
| 601 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 602 |
+
<data key="e_timestamp">1663125026</data>
|
| 603 |
+
<data key="e_label_binary">malicious</data>
|
| 604 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 605 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 606 |
+
<data key="e_mo_name">Data Theft</data>
|
| 607 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 608 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 609 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 610 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 611 |
+
<data key="e_disposition">Disrupted</data>
|
| 612 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 613 |
+
</edge>
|
| 614 |
+
<edge id="e30" source="HOST-13202" target="HOST-12782">
|
| 615 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 616 |
+
<data key="e_timestamp">1663125026</data>
|
| 617 |
+
<data key="e_label_binary">malicious</data>
|
| 618 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 619 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 620 |
+
<data key="e_mo_name">Data Theft</data>
|
| 621 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 622 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 623 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 624 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 625 |
+
<data key="e_disposition">Disrupted</data>
|
| 626 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 627 |
+
</edge>
|
| 628 |
+
<edge id="e31" source="HOST-12782" target="HOST-13202">
|
| 629 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 630 |
+
<data key="e_timestamp">1663125026</data>
|
| 631 |
+
<data key="e_label_binary">malicious</data>
|
| 632 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 633 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 634 |
+
<data key="e_mo_name">Data Theft</data>
|
| 635 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 636 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 637 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 638 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 639 |
+
<data key="e_disposition">Disrupted</data>
|
| 640 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 641 |
+
</edge>
|
| 642 |
+
<edge id="e32" source="ccb6e861-267d-11ed-a281-c1fab458b95d" target="HOST-13775">
|
| 643 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 644 |
+
<data key="e_timestamp">1663125026</data>
|
| 645 |
+
<data key="e_label_binary">malicious</data>
|
| 646 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 647 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 648 |
+
<data key="e_mo_name">Data Theft</data>
|
| 649 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 650 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 651 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 652 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 653 |
+
<data key="e_disposition">Disrupted</data>
|
| 654 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 655 |
+
</edge>
|
| 656 |
+
<edge id="e33" source="HOST-13775" target="ccb6e861-267d-11ed-a281-c1fab458b95d">
|
| 657 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 658 |
+
<data key="e_timestamp">1663125026</data>
|
| 659 |
+
<data key="e_label_binary">malicious</data>
|
| 660 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 661 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 662 |
+
<data key="e_mo_name">Data Theft</data>
|
| 663 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 664 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 665 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 666 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 667 |
+
<data key="e_disposition">Disrupted</data>
|
| 668 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 669 |
+
</edge>
|
| 670 |
+
<edge id="e34" source="084aa654-32db-11ed-a658-6738815b545a" target="HOST-14095">
|
| 671 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 672 |
+
<data key="e_timestamp">1663125026</data>
|
| 673 |
+
<data key="e_label_binary">malicious</data>
|
| 674 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 675 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 676 |
+
<data key="e_mo_name">Data Theft</data>
|
| 677 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 678 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 679 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 680 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 681 |
+
<data key="e_disposition">Disrupted</data>
|
| 682 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 683 |
+
</edge>
|
| 684 |
+
<edge id="e35" source="HOST-14095" target="084aa654-32db-11ed-a658-6738815b545a">
|
| 685 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 686 |
+
<data key="e_timestamp">1663125026</data>
|
| 687 |
+
<data key="e_label_binary">malicious</data>
|
| 688 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 689 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 690 |
+
<data key="e_mo_name">Data Theft</data>
|
| 691 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 692 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 693 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 694 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 695 |
+
<data key="e_disposition">Disrupted</data>
|
| 696 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 697 |
+
</edge>
|
| 698 |
+
<edge id="e36" source="2f07c422-33c7-11ed-bfee-7f21394fcb29" target="HOST-14095">
|
| 699 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 700 |
+
<data key="e_timestamp">1663125026</data>
|
| 701 |
+
<data key="e_label_binary">malicious</data>
|
| 702 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 703 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 704 |
+
<data key="e_mo_name">Data Theft</data>
|
| 705 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 706 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 707 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 708 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 709 |
+
<data key="e_disposition">Disrupted</data>
|
| 710 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 711 |
+
</edge>
|
| 712 |
+
<edge id="e37" source="HOST-14095" target="2f07c422-33c7-11ed-bfee-7f21394fcb29">
|
| 713 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 714 |
+
<data key="e_timestamp">1663125026</data>
|
| 715 |
+
<data key="e_label_binary">malicious</data>
|
| 716 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 717 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 718 |
+
<data key="e_mo_name">Data Theft</data>
|
| 719 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 720 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 721 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 722 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 723 |
+
<data key="e_disposition">Disrupted</data>
|
| 724 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 725 |
+
</edge>
|
| 726 |
+
<edge id="e38" source="c03bc4b2-33d0-11ed-8138-e78ae9325a59" target="HOST-14095">
|
| 727 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 728 |
+
<data key="e_timestamp">1663125026</data>
|
| 729 |
+
<data key="e_label_binary">malicious</data>
|
| 730 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 731 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 732 |
+
<data key="e_mo_name">Data Theft</data>
|
| 733 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 734 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 735 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 736 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 737 |
+
<data key="e_disposition">Disrupted</data>
|
| 738 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 739 |
+
</edge>
|
| 740 |
+
<edge id="e39" source="HOST-14095" target="c03bc4b2-33d0-11ed-8138-e78ae9325a59">
|
| 741 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 742 |
+
<data key="e_timestamp">1663125026</data>
|
| 743 |
+
<data key="e_label_binary">malicious</data>
|
| 744 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 745 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 746 |
+
<data key="e_mo_name">Data Theft</data>
|
| 747 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 748 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 749 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 750 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 751 |
+
<data key="e_disposition">Disrupted</data>
|
| 752 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 753 |
+
</edge>
|
| 754 |
+
<edge id="e40" source="561723a2-19b7-11ed-88a2-8f534cb727b0" target="HOST-14095">
|
| 755 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 756 |
+
<data key="e_timestamp">1663125026</data>
|
| 757 |
+
<data key="e_label_binary">malicious</data>
|
| 758 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 759 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 760 |
+
<data key="e_mo_name">Data Theft</data>
|
| 761 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 762 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 763 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 764 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 765 |
+
<data key="e_disposition">Disrupted</data>
|
| 766 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 767 |
+
</edge>
|
| 768 |
+
<edge id="e41" source="HOST-14095" target="561723a2-19b7-11ed-88a2-8f534cb727b0">
|
| 769 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 770 |
+
<data key="e_timestamp">1663125026</data>
|
| 771 |
+
<data key="e_label_binary">malicious</data>
|
| 772 |
+
<data key="e_label_confidence">0.930390625</data>
|
| 773 |
+
<data key="e_suspicion_score">0.930390625</data>
|
| 774 |
+
<data key="e_mo_name">Data Theft</data>
|
| 775 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 776 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 777 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 778 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 779 |
+
<data key="e_disposition">Disrupted</data>
|
| 780 |
+
<data key="e_incident_id">c7b6da90-33da-11ed-bcaf-e3fcd610a254</data>
|
| 781 |
+
</edge>
|
| 782 |
+
</graph>
|
| 783 |
+
</graphml>
|
graph/incidents_graphml/c/c7d05e10-0725-11ee-9ff8-05edc9624e6c.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="61a43cc1-0639-11ee-8434-e720bc5c09e1">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">192.168.233.197</data>
|
| 35 |
+
<data key="n_hostname">192.168.233.197</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="33ee47d1-0648-11ee-b879-8fa356303378">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.72.203</data>
|
| 43 |
+
<data key="n_hostname">100.64.72.203</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="61a43cc1-0639-11ee-8434-e720bc5c09e1" target="33ee47d1-0648-11ee-b879-8fa356303378">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1686356934</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c7d05e10-0725-11ee-9ff8-05edc9624e6c</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="33ee47d1-0648-11ee-b879-8fa356303378" target="61a43cc1-0639-11ee-8434-e720bc5c09e1">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1686356934</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">c7d05e10-0725-11ee-9ff8-05edc9624e6c</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/c/c7d0cb30-1958-11ee-b3de-e709a8260af8.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.70.227</data>
|
| 35 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="4d4706e2-0643-11ee-a1c0-af40b19a49a7">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.78.244</data>
|
| 43 |
+
<data key="n_hostname">100.64.78.244</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-13083" target="HOST-15048">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688357959</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c7d0cb30-1958-11ee-b3de-e709a8260af8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c7e05460-73d5-11ee-9478-f721b34a9cef.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="f39692d2-62dd-11ee-b5a9-19b7e687c7ca">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.18.187</data>
|
| 35 |
+
<data key="n_hostname">100.64.18.187</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.168.48</data>
|
| 43 |
+
<data key="n_hostname">172.30.168.48</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-4295" target="HOST-2842">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1698307251</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c7e05460-73d5-11ee-9478-f721b34a9cef</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c7e0f950-ddd0-11ee-a342-9d44f1915d3d.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="346b02a0-062c-11ee-9897-5fbc3597a39b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.54.31</data>
|
| 35 |
+
<data key="n_hostname">100.64.54.31</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.29.158.1</data>
|
| 43 |
+
<data key="n_hostname">172.29.158.1</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-9336" target="HOST-2858">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1709959927</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c7e0f950-ddd0-11ee-a342-9d44f1915d3d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c7e17d30-3d6c-11ee-b209-c721199fad49.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.27.202.53</data>
|
| 35 |
+
<data key="n_hostname">172.27.202.53</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="897e8c40-0626-11ee-8794-6bae0a4a6dd8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.11.152</data>
|
| 43 |
+
<data key="n_hostname">100.64.11.152</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2703" target="HOST-3315">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1692324791</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c7e17d30-3d6c-11ee-b209-c721199fad49</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c7e4c860-1958-11ee-b3de-e709a8260af8.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="8814f1b1-0648-11ee-9488-69c5977d12da">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.78.245</data>
|
| 35 |
+
<data key="n_hostname">100.64.78.245</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.70.227</data>
|
| 43 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="8814f1b1-0648-11ee-9488-69c5977d12da" target="HOST-13083">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688357959</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c7e4c860-1958-11ee-b3de-e709a8260af8</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c7e82540-5789-11ee-b4dd-e56c30c12cd4.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.31.182.227</data>
|
| 35 |
+
<data key="n_hostname">172.31.182.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c02fe7b2-5500-11ee-9640-f5c687ccca23">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.57.50</data>
|
| 43 |
+
<data key="n_hostname">100.64.57.50</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2761" target="c02fe7b2-5500-11ee-9640-f5c687ccca23">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1695195977</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">c7e82540-5789-11ee-b4dd-e56c30c12cd4</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/c/c7ea0b00-0373-11ed-8991-41244357ae3d.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="546ccad0-eb5b-11ec-b578-7bb4b206dd31">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.68.115</data>
|
| 35 |
+
<data key="n_hostname">100.64.68.115</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e1db83e0-ea91-11ec-90c7-eff83c975df3">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.1.109</data>
|
| 43 |
+
<data key="n_hostname">USER-0015-1627.example.internal</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="546ccad0-eb5b-11ec-b578-7bb4b206dd31" target="HOST-12803">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1657803132</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c7ea0b00-0373-11ed-8991-41244357ae3d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-12803" target="546ccad0-eb5b-11ec-b578-7bb4b206dd31">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1657803132</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 67 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">c7ea0b00-0373-11ed-8991-41244357ae3d</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/c/c7f16b60-73d5-11ee-9478-f721b34a9cef.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.168.48</data>
|
| 35 |
+
<data key="n_hostname">172.30.168.48</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="f39692d2-62dd-11ee-b5a9-19b7e687c7ca">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.18.187</data>
|
| 43 |
+
<data key="n_hostname">100.64.18.187</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2842" target="HOST-4295">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1698307251</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">c7f16b60-73d5-11ee-9478-f721b34a9cef</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|